Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method to implement SHA-1 algorithm using GPU

An algorithm and function technology, applied in the field of using GPU to realize SHA-1 algorithm, can solve the problems of poor processing performance of information security equipment, poor security of operation process, and high CPU load, so as to improve processing performance, high security, and reduce CPU load. load effect

Inactive Publication Date: 2011-12-28
四川卫士通信息安全平台技术有限公司
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] SHA (Secure Hash Algorithm, translated as Secure Hash Algorithm) is designed by the National Security Agency (NSA) and released by the National Institute of Standards and Technology (NIST). A series of cryptographic hash functions, the SHA-1 algorithm can calculate messages with a length of no more than 264 bits, and generate a 160-bit information summary as an output. In the implementation of information security equipment, a large number of information summary operations such as SHA-1 are required At present, the commonly used SHA-1 algorithm has disadvantages such as poor flexibility, high CPU load, poor processing performance of information security equipment, low operation efficiency, and poor operation process security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention is further described below, but the protection scope of the present invention is not limited to the following description.

[0015] A method for implementing the SHA-1 algorithm using a GPU, comprising the following steps:

[0016] (1) Implement the SHA-1 algorithm on a general-purpose CPU: The implementation of the SHA-1 algorithm on a general-purpose CPU includes at least the initialization function SHA1Init, the update function SHA1Update, and the termination function SHA1Final that repeatedly perform shift, AND, OR, and XOR operations, as follows Shown:

[0017] void SHA1Init (SHA1Context *sc)

[0018] {

[0019] ...

[0020]}

[0021] void SHA1Update (SHA1Context *sc, const void *vdata, uint32_t len)

[0022] {

[0023] ...

[0024]}

[0025] void SHA1Final (SHA1Context *sc, uint8_t hash[SHA1_HASH_SIZE])

[0026] {

[0027] ...

[0028]}

[0029] int main (int argc, char *argv[])

[0030] {

[0031] SHA1Context foo;

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for implementing the SHA-1 algorithm by using a GPU, which includes the following steps: (1) implementing the SHA-1 algorithm on a general-purpose CPU; (2) transplanting the program to the GPU, and performing preprocessing according to the following method Processing: a. Create an empty function body; B. Copy the parameters from the main memory to the global matching storage space of the GPU through the parameter pointer, and copy the result from the global matching storage space of the GPU back to the main memory; C. Add device configuration modifier; D. Synchronize. The present invention provides a method for implementing the SHA-1 algorithm by using the GPU, utilizing the rapidly developing graphics hardware technology, adopting the CUDA parallel computing architecture of NVIDIA Corporation for parallel implementation, and using the GPU as a parallel computing device for program release and management operations, with flexible It has good performance, reduces CPU load, improves the processing performance of information security equipment, improves computing efficiency, and has the advantages of high security in the computing process.

Description

technical field [0001] The invention relates to the field of information security processing, in particular to a method for implementing the SHA-1 algorithm by using a GPU. Background technique [0002] With the continuous development of information technology, the contact between people is more and more frequent, distance is no longer a problem, and security issues have aroused people's close attention in the process of information transmission. Digital signature is an important aspect of the development of electronic information technology. The product is a signature confirmation method for electronic documents. Its purpose is to mark the legality and authenticity of digital objects and provide the signer's commitment. With the widespread use of information technology, especially e-commerce, With the rapid development of e-government, the demand for digital signature applications is increasing. Its implementation not only requires the correctness of execution, but also is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F9/50
Inventor 李晓云王亚栋邓春梅刘颖
Owner 四川卫士通信息安全平台技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products