SM4 acceleration method and device

A technology for encrypting keys and registers, which is applied in the computer field and can solve problems such as increased power consumption, long-term occupation, and tight allocation of system resources.

Pending Publication Date: 2019-07-19
OPEN SECURITY RES INC
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For some computing devices, such as general-purpose processors, when using pure software to perform SM4 hash operations, there are often disadvantages such as low efficiency and long-term occupation of the device, resulting in tight allocation of system resources and increased power consumption
And some hardware solutions, pure hardware realizes SM4 hash operation, which increases the hardware cost too much

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM4 acceleration method and device
  • SM4 acceleration method and device
  • SM4 acceleration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] The main process of the SM4 hash algorithm includes: message filling, message expansion and compression functions.

[0023] see figure 1 , is the flow chart of the embodiment of the SM4 acceleration method provided by the present invention; the method of the present embodiment is applied to a computing device provided with internal re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to an SM4 acceleration method and device. The method comprises the following steps: adding an auxiliary register on the basis of an original internal register of a computing device, performing round key expansion calculation on an encryption key to generate a round key, and processing an input message by the round key; wherein at least one of round key expansion calculation and information input by processing the round key is realized through an expansion instruction; and storing the round key generated by calculation and the processing result into a preset register. By implementing the embodiment of the invention, the efficiency of SM4 operation is improved in a soft and hard combination manner, the cost is considered, and better configuration of resources is achieved.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and in particular to an SM4 acceleration method and device. Background technique [0002] SM4 is a block cipher algorithm (GMT 0002-2012) issued by the State Cryptography Administration. The block length and key length of this algorithm are both 128 bits. Both the encryption algorithm and the key expansion algorithm adopt a 32-round nonlinear iterative structure. The algorithm structure of encryption and decryption is the same, but the order of using the round key is reversed, and the decryption round key is the reverse order of the encryption round key. For some computing devices, such as general-purpose processors, when using pure software to perform SM4 hash operations, there are often disadvantages of low efficiency and long-term occupation of the device, which leads to tight allocation of system resources and increased power consumption. For some hardware solutions,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0631H04L9/0816H04L2209/12H04L2209/122
Inventor 高夫
Owner OPEN SECURITY RES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products