Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for accelerating common key code operation and its system structure

A technology of public key cryptography and arithmetic processor, which is applied in the direction of calculation using residual algorithm, public key for secure communication, calculation using non-numerical representation, etc. It can solve the problems of reducing calculation efficiency and affecting code quality, etc. Achieve simple design, improve computing efficiency, and simple application

Inactive Publication Date: 2009-07-22
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, using a compiler to generate instructions will cause the computing performance of the entire system to be largely determined by the compilation technology; it will also affect the quality of the code, resulting in reduced computing efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for accelerating common key code operation and its system structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Further illustrate the present invention below in conjunction with accompanying drawing.

[0024] refer to figure 1 , the architecture used to accelerate public key cryptographic operations includes: a register module 1 composed of register banks, a sequence instruction generator module 2 for generating dot multiplication or modular exponentiation instructions, and a dual-field multiply-adder, shift An arithmetic processor module 3 composed of an adder and a dual-domain adder realizes a static memory module 4 and a SoC bus 5 for two reads and one write. The register module 1 and the static memory module 4 are respectively connected to the SoC bus 5 connected to an external master controller. The register module 1 is connected to the sequence instruction generator module 2 , and the sequence instruction generator module 2 and the static memory module 4 are respectively connected to the arithmetic processor module 3 .

[0025] Taking elliptic curve cryptography (ECC) dot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for accelerating public key cryptographic operations and its system structure. Use the SoC bus to configure the parameters of the register module to complete the definition of the public key cryptographic algorithm; the sequence instruction generator module is responsible for generating instructions to realize dot multiplication or modular exponentiation according to the configuration of the register module, and send them at the end of the operation The operation completion flag is given to the register module; the operation processor uses a four-stage pipeline to complete the execution of instructions and access data from the static memory unit. The invention has the characteristics of simple realization method, wide application range and fast calculation speed.

Description

technical field [0001] The invention relates to a method for accelerating public key cryptographic operations and its system structure, and is especially suitable for realizing the acceleration of point multiplication operations of ECC and modular exponentiation operations of RSA. Background technique [0002] At present, with the process of my country's national economy and social informatization construction, such as the rapid development of financial informatization, e-commerce, and e-government, it is urgent to solve the information security problems of information systems in important fields such as economy and culture, improve the level of security protection, and enhance information security. Security Active Defense and Response Capabilities. The core technology in information security is cryptography, and the public key cryptography system has played a great role in the field of information security since its appearance, and has a good application prospect. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30G06F7/72
Inventor 沈海斌严晓浪
Owner ZHEJIANG UNIV