Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implement method of elliptic curve cipher system coprocessor

A technology of elliptic curve cryptography and coprocessor, which is applied in the field of public key cryptography, can solve problems such as ineffective results, and achieve the effects of convenient initialization, improved work efficiency, and fast processing speed

Inactive Publication Date: 2007-07-18
SOUTHEAST UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Security is the key factor of any cryptographic system. At present, the security analysis of ECC has not yielded fruitful results, and no effective attack method has been found. It is generally believed that its time complexity is exponential. Therefore, for ECC, as long as an appropriate The parameters of the security domain, the existing attack methods are difficult to break it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implement method of elliptic curve cipher system coprocessor
  • Implement method of elliptic curve cipher system coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] 1) Reference standard

[0059] The international standards mainly referred to in this implementation method are [ANSI X9.62], [IEEE P1363], [SEC1], [SEC2] and the coprocessor design idea of ​​SUN Company.

[0060] 2) Hardware structure

[0061] We borrowed the ideas of general computer processors, combined with the operation mode of ECC background domain, designed the ECC coprocessor on the binary domain.

[0062] The coprocessor is composed of two dual-terminal memories, two 256-bit internal buses, 16 256 registers, a shift register, a controller, and a binary domain bottom operation module; among them, the binary field bottom operation module is an exclusive OR module , multiplication module and division module. The core module of the ECC coprocessor is the controller part, which is responsible for reading instructions from the instruction memory and parsing instructions, and then reading, processing, storing and jumping instructions according to the instructions. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for realizing coprocessor of oval curve cipher system includes dividing functions of complete coprocessor first and then detailing divided functions to be each bottom layer module in design, realizing each bottom layer module first and testing then separately then integrating them to be complete ECC coprocessor in realization. The 256 position universal coprocessor for solving point multiplication problem in ECC calculation is also disclosed.

Description

technical field [0001] The invention relates to a hardware coprocessor of a cryptographic system in information security, and relates to the technical field of public key cryptosystems. Background technique [0002] Public key cryptography: In 1976, Stanford University researchers Whitfield Diffie and Martin Hellman jointly developed a public key cryptography that can solve the problem of secure key exchange. Public-key cryptography is asymmetric and uses two keys that are inversely associated: a public key and a private key. The public key is freely disclosed, and the private key is kept secretly by the user. When a message is encrypted with a public key, only the corresponding private key can decrypt it, and vice versa. Both parties in the communication have their own public key and private key. To send a message securely, the sender encrypts the message with the receiver's public key; after receiving the message, the receiver decrypts it with its own private key. Beca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F7/72H04L9/30
Inventor 曹秀英李青
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products