A novel elliptic curve password coprocessor
An elliptic curve cryptography and coprocessor technology, applied in the field of information security, can solve problems such as imperfect data paths, achieve the effects of accelerating time to market, reducing power consumption, and gaining economic benefits
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The following is based on Figure 1 to Figure 3 A preferred embodiment of the present invention is given to better illustrate the structural features and functional features of the present invention, but it is not used to limit the scope of the present invention.
[0034] refer to figure 1 As shown, the elliptic curve cryptographic coprocessor of the present invention is applied to an ECC public key cryptosystem composed of a main processor and a coprocessor.
[0035] figure 1The main processor (MCU) in the system mainly completes two tasks, including point product scheduling for elliptic curve cryptographic algorithms and communication control with coprocessors. It mainly plays the role of a software controller, and the present invention is mainly aimed at using an embedded 32-bit RISC CPU. The coprocessor is the core component to complete the most complex operation in the elliptic curve cryptographic algorithm - dot multiplication operation. It is a full hardware i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 