Intel® Pentium® Silver and Intel® Celeron® Processors Datasheet, Volume 1
Datasheet
ID | Date | Version | Classification |
---|---|---|---|
633935 | 17/06/2021 00:00:00 | Public Content |
A newer version of this document is available. Customers should click here to go to the newest version.
Intel® Secure Hash Algorithm Extensions (Intel® SHA Extensions)
Intel® Secure Hash Algorithm (SHA) is one of the most commonly employed cryptographic algorithms. Primary usages of Intel® SHA include data integrity, message authentication, digital signatures, and data de-duplication. As the pervasive use of security solutions continues to grow, Intel® SHA can be seen in more applications now than ever. The Intel® SHA Extensions are designed to improve the performance of these compute-intensive algorithms on Intel® architecture-based processors.
The Intel® SHA Extensions are a family of seven instructions based on the Intel® Streaming SIMD Extensions (Intel® SSE) that are used together to accelerate the performance of processing SHA-1 and SHA-256 on Intel® architecture-based processors. Given the growing importance of Intel® SHA in our everyday computing devices, the new instructions are designed to provide a needed boost of performance to hashing a single buffer of data. The performance benefits not only help improve responsiveness and lower power consumption for a given application, they may enable developers to adopt Intel® SHA in new applications to protect data while delivering to their user experience goals. The instructions are defined in a way that simplifies their mapping into the algorithm processing flow of most software libraries, thus enabling easier development. More information on Intel® SHA is available at http://software.intel.com/en-us/articles/intel-sha-extensions.