SM3 cryptographic hash algorithm message extension serial optimization system and method

A hash algorithm and optimization method technology, applied in the field of information security, can solve the problems of large intermediate storage value, low operation efficiency, low utilization rate of registers or storage units, etc., to achieve less registers, reduce the number of operation rounds, and shorten operation time Effect

Active Publication Date: 2021-01-08
SHANDONG HUAYI MICRO ELECTRONICS
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing national secret SM3 password hash algorithm requires a large number of intermediate storage values, and the operation efficiency is low
In the implementation process of the existing national secret SM3 cryptographic hash algorithm, a large number of registers or storage units are usually used to pre-calculate and store W0-W67, W0'-W63' generated during the message expansion operation process, which will result in a large number of registers or The problem of low storage unit utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM3 cryptographic hash algorithm message extension serial optimization system and method
  • SM3 cryptographic hash algorithm message extension serial optimization system and method
  • SM3 cryptographic hash algorithm message extension serial optimization system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]In the SM3 cryptographic hash algorithm, the message extension is defined as follows: group the message into B(i)Expand to 132 words W according to the following method0,W1,...W67,W’0,W’1,...W’63For the compression function CF:

[0026]A) Group the message B(i)Divided into 16 words W0,W1,...W15.

[0027]For j=16 To 67

[0028]

[0029]B)End For

[0030]For j=0 To 63

[0031]

[0032]C)End For

[0033]Among them, the symbols and characters are interpreted as:

[0034]B(i): The i-th message group

[0035]CF: Compression function

[0036]Word: a bit string of length 32

[0037]P1: Permutation function in message extension,

[0038]X in the formula is a word

[0039]32-bit exclusive OR operation

[0040]<<

[0041]According to the above definition, usually in the process of implementing SM3 cryptographic hash algorithm, 16-67 rounds of W must be calculated first.j52 rounds of calculation are needed, and then W’j64 rounds of calculation are required. In addition, a 132-word memory pair W0,W1,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SM3 cryptographic hash algorithm message extension serial optimization system and method. The system comprises a fixed storage area, a first special register, a second special register and an arithmetic unit, the first special register and the second special register can carry out read-write operation on the fixed storage area, and the arithmetic unit carries out arithmetic processing on numerical values of the first special register and the second special register. The system and the method have the characteristics of less registers, low power consumption and the like. Meanwhile, the operation time can be shortened, and the implementation area can be reduced, namely, the operation rounds and the use of memories are reduced.

Description

Technical field[0001]The invention relates to the technical field of information security, in particular to a serial optimization method and system for message expansion in a national secret SM3 cryptographic hash algorithm.Background technique[0002]As the most widely used cryptographic algorithm, the cryptographic hash function plays an extremely important role in production and life. It is mainly used in many security fields such as hash operations on data, digital signatures, and message authentication codes. It is cryptographic implementation , An important part of the security protocol. Commonly used cryptographic hash functions at home and abroad include SHA-1 algorithm, SHA-2 series algorithm, SHA-3 algorithm and domestic SM3 cryptographic hash algorithm issued by the National Institute of Standards and Technology (NIST). Since hash function ciphers are often used in scenarios involving large amounts of data processing, they have high requirements on the speed, area, and powe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08G06F9/30G06F21/60
CPCH04L9/0631H04L9/0897G06F9/30098G06F21/602
Inventor 韩光曾为民李向宏
Owner SHANDONG HUAYI MICRO ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products