Hardware implementation of the secure hash standard
First Claim
Patent Images
1. An integrated circuit for implementing a secure hash algorithm, comprising:
- a data path configured to process an input message by performing rounds of the secure hash algorithm, the data path comprising hardware components that are reconfigurable; and
a controller configured to control operation of the data path in performing the rounds of the secure hash algorithm, the controller comprising hardware components including an address control module and a finite state machine that cooperate with each other to provide control bits and physical memory addresses during each round of the secure hash algorithm;
wherein at least some of the hardware components of the data path are reconfigured during each round of the secure hash algorithm in response to the control bits provided during each round of the secure hash algorithm; and
wherein variable values stored in a variable memory are provided to the data path for processing during each round of the secure hash algorithm in response to the physical memory addresses provided during each round of the secure hash algorithm.
3 Assignments
0 Petitions
Accused Products
Abstract
An integrated circuit for implementing the secure hash algorithm is provided. According to one aspect of the integrated circuit, the integrated circuit includes a data path and a controller controlling operation of the data path. According to another aspect of the integrated circuit, the data path is capable of handling each round of processing reiteratively. The controller further includes an address control module and a finite state machine.
476 Citations
21 Claims
-
1. An integrated circuit for implementing a secure hash algorithm, comprising:
-
a data path configured to process an input message by performing rounds of the secure hash algorithm, the data path comprising hardware components that are reconfigurable; and a controller configured to control operation of the data path in performing the rounds of the secure hash algorithm, the controller comprising hardware components including an address control module and a finite state machine that cooperate with each other to provide control bits and physical memory addresses during each round of the secure hash algorithm; wherein at least some of the hardware components of the data path are reconfigured during each round of the secure hash algorithm in response to the control bits provided during each round of the secure hash algorithm; and wherein variable values stored in a variable memory are provided to the data path for processing during each round of the secure hash algorithm in response to the physical memory addresses provided during each round of the secure hash algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An integrated circuit for implementing a secure hash algorithm with multiple rounds, comprising:
-
a data path circuit comprising the following hardware components; a variable memory; a first multiplexor coupled to the variable memory; a first register coupled to the first multiplexor; a shifter coupled to the first register; an arithmetic logic unit coupled to the shifter and the first multiplexor; a second register coupled to the arithmetic logic unit; and a second multiplexor coupled to the second register, the variable memory and the arithmetic logic unit; and a controller configured to control operation of the data path circuit, comprising; a finite state machine; and an address control module operable in conjunction with the finite state machine to generate physical memory addresses and control bits during each round of the secure hash algorithm; wherein at least some of the hardware components of the data path circuit are reconfigurable and are reconfigured during each round of the secure hash algorithm in response to the control bits provided during each round of the secure hash algorithm; and wherein the variable memory provides variable values during each round of the secure hash algorithm for processing by others of the hardware components of the data path circuit in response to the physical memory addresses provided during each round of the secure hash algorithm. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of implementing multiple rounds of a secure hash algorithm, the method comprising:
-
configuring a reconfigurable hardware data path to process an input message by performing rounds of the secure hash algorithm, the data path comprising hardware components that are reconfigurable; and configuring a reconfigurable hardware controller including a finite state machine to control operation of the data path during each round, and an address control module, the address control module and the finite state machine cooperating with each other to provide control bits and physical memory addresses during each round of the secure hash algorithm; wherein at least some of the hardware components of the data path are reconfigured during each round of the secure hash algorithm in response to the control bits provided during each round of the secure hash algorithm; and wherein variable values stored in a variable memory are provided to the data path for processing during each round of the secure hash algorithm in response to the physical memory addresses provided during each round of the secure hash algorithm. - View Dependent Claims (19, 20, 21)
-
Specification