Method and apparatus to process SHA-2 secure hashing algorithm

A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage l...

Full description

Saved in:
Bibliographic Details
Main Authors Yap, Kirk S, Guilford, James D, Gulley, Sean M, Wolrich, Gilbert M, Gopal, Vinodh, Ozturk, Erdinc, Dixon, Martin G, Feghali, Wajdi K
Format Patent
LanguageEnglish
Published 13.11.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A processor includes an instruction decoder to receive a first instruction to process a secure hash algorithm 2 (SHA-2) hash algorithm, the first instruction having a first operand associated with a first storage location to store a SHA-2 state and a second operand associated with a second storage location to store a plurality of messages and round constants. The processor further includes an execution unit coupled to the instruction decoder to perform one or more iterations of the SHA-2 hash algorithm on the SHA-2 state specified by the first operand and the plurality of messages and round constants specified by the second operand, in response to the first instruction.
Bibliography:Application Number: US201615396578