Time point system for ellipse curve password system

An elliptic curve cryptography and point-doubling technology, applied in user identity/authority verification, etc., can solve the problems of low serial computing efficiency and waste of clock cycles.

Inactive Publication Date: 2008-09-10
TSINGHUA UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0046] Calculating the point addition and doubling of elliptic curves is in consideration of reducing the area. The method of serial calculation is generally used. However, the efficiency of serial calculation is relatively low. By analyzing the data correlation of point addition and doublin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time point system for ellipse curve password system
  • Time point system for ellipse curve password system
  • Time point system for ellipse curve password system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0186] The train of thought of the present invention is: 1) Utilize the calculating formula of elliptic curve doubling point under the Jacobi projection coordinate system, carry out data correlation analysis, extract mutually independent operation, determine that the pipeline stage is three stages. 2) Analyze the key operations in the doubling operation, set them as the highest priority, and then put the lower priority operations into the pipeline process according to the order of operations, while minimizing the number of intermediate variable registers used. 3) According to the number of clock cycles required for a single modular multiplication, in a general sense, the time consumption for the multiplication point of the three-stage pipeline is extracted.

[0187] These three ideas are detailed below:

[0188] 1) Data correlation analysis of multiple points:

[0189] As shown in Table 1, using the calculation formula of elliptic curve multiplication points under the Jacobi ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a point-timing system of an elliptic curve cryptosystem, which pertains to the point-timing technical field of an elliptic curve cryptosystem and is characterized in that: the invention includes a controller of a point-timing register, a point-timing multipath option controller, a first multipath selector group, a middle variable register group and a second multipath selector group; under gating control signals output by the point-timing multipath option controller and in the process of six production lines, point-timing algorithm for multipliers and addends of the second multipath selector group is carried out by a modular multiplier and a modular adder positioned outside the point-timing system. In each production line, under the control of the gating control signals, the modular multiplier and the modular adder respectively return intermediate data to the first and the second multipath selector groups; under the control of operation control signals output by the controller of the point-timing register, each multipath selector controlling the first multipath selector group outputs relevant multipliers and addends to the second multipath selector group by the middle variable register group. The point-timing system of an elliptic curve cryptosystem of the invention increases point-timing arithmetic speed, optimizes point- multiplying performance of elliptic curves under a basic level and improves data throughput rate.

Description

technical field [0001] The invention relates to the technical field of digital signature and authentication. Background technique [0002] Cryptographic systems can be divided into traditional (or symmetric) encryption systems and public key (or asymmetric) encryption systems. In 1976, W.Diffie and M.E.Hellman proposed the concept of public key cryptography, which had a profound impact on the development of the entire cryptography. The currently widely used public key cryptosystem is RSA, which has the advantages of simple principle and convenient use. However, with the continuous improvement of the large integer factorization method and the continuous improvement of computer performance, the number of key bits required to ensure the security of RSA continues to increase. At present, it is generally believed that the number of bits of the RSA key is more than 1024 bits to ensure security. . The increase in the number of key bits directly leads to a sharp drop in encryptio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 李树国张霄鹏
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products