Methods and apparatus are provided for implementing a cryptography
accelerator for performing operations such as hash operations. The
cryptography accelerator recognizes characteristics associated with input
data and retrieves an instruction set for processing the input data. The
instruction set is used to configure or control components such as MD5
and SHA-1 hash cores, XOR components, memory, etc. By providing a
cryptography accelerator with access to multiple instruction sets, a
variety of hash operations can be performed in a configurable
cryptographic accelerator.