Unlock instant, AI-driven research and patent intelligence for your innovation.

A novel elliptic curve password coprocessor

An elliptic curve cryptography and coprocessor technology, applied in the field of information security, can solve problems such as imperfect data paths, achieve the effects of accelerating time to market, reducing power consumption, and gaining economic benefits

Inactive Publication Date: 2009-09-02
上海迪申电子科技有限责任公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, in the Elliptic Curve Cryptosystem (ECC), there are still imperfections about the optimization of the Elliptic Curve Cryptography Algorithm, the system architecture of the Elliptic Curve Cryptography Coprocessor, and the data path of the Elliptic Curve Cryptography Coprocessor. further improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A novel elliptic curve password coprocessor
  • A novel elliptic curve password coprocessor
  • A novel elliptic curve password coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following is based on Figure 1 to Figure 3 A preferred embodiment of the present invention is given to better illustrate the structural features and functional features of the present invention, but it is not used to limit the scope of the present invention.

[0034] refer to figure 1 As shown, the elliptic curve cryptographic coprocessor of the present invention is applied to an ECC public key cryptosystem composed of a main processor and a coprocessor.

[0035] figure 1The main processor (MCU) in the system mainly completes two tasks, including point product scheduling for elliptic curve cryptographic algorithms and communication control with coprocessors. It mainly plays the role of a software controller, and the present invention is mainly aimed at using an embedded 32-bit RISC CPU. The coprocessor is the core component to complete the most complex operation in the elliptic curve cryptographic algorithm - dot multiplication operation. It is a full hardware i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An elliptic curve cryptographic processor, which is applied to an ECC public key cryptosystem composed of a main processor and a coprocessor, is characterized in that the main processor is composed of an embedded microprocessor, contains a point multiplication controller and a communication controller, It is connected with the elliptic curve cryptographic coprocessor through the bus and the coprocessor-specific interface. The coprocessor is a hardware controller, which contains a bus state follower, a decoding control circuit and a data path connected in a circuit, and implements the control of the main processor respectively. State tracking, to determine whether it is a coprocessor extension instruction and give a handshake signal with the main processor; translate the coprocessor extension instruction into microcode, and then translate it into a data path for data exchange and control signals for finite field operations . The invention has the advantages that it can cooperate with an embedded CPU to form an elliptic curve cryptographic system; it can flexibly realize system reconfiguration and reduce redevelopment cost; and it is easy to realize the optimal combination scheme of operation speed, chip area and power consumption.

Description

technical field [0001] The invention is mainly applied in the field of information security to ensure the confidentiality, integrity and non-repudiation of important and sensitive information. Background technique [0002] As an important problem in algebraic geometry, elliptic curve has been studied for more than 100 years, but it was not introduced into cryptography until 1986. In the early stage of its proposal, due to the lack of effective algorithms for generating the basic application parameters of elliptic curves, it has not attracted people's attention. It is worth noting that it was not until 1993 that this cryptographic system was effectively realized. Elliptic Curve Cryptosystem (ECC) is a public key cryptosystem whose security is based on the difficulty of finding discrete logarithms on elliptic curves. The reason why the ECC cryptographic algorithm has attracted people's attention is that, in addition to its theoretical significance, it also has the advantages ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28G06F7/72
Inventor 曾晓洋顾震宇章倩苓陈超
Owner 上海迪申电子科技有限责任公司