Method for realizing elliptic curve cryptosystem algorithm over prime field in integrated circuit

A technology of elliptic curve cryptography and integrated circuits, which is applied to calculations using non-numerical representations, calculations using residual algorithms, and public keys for secure communications. Poor and other problems, to achieve the effect of reducing computing overhead, reducing area, and not affecting performance

Active Publication Date: 2009-09-30
上海航芯电子科技股份有限公司
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the field of information security, most of the actual ECC algorithms are implemented using software methods or calling RSA and modular multiplication coprocessors for acceleration. Even if there are hardware chips t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing elliptic curve cryptosystem algorithm over prime field in integrated circuit
  • Method for realizing elliptic curve cryptosystem algorithm over prime field in integrated circuit
  • Method for realizing elliptic curve cryptosystem algorithm over prime field in integrated circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings, but the present embodiments are not intended to limit the present invention, and all similar structures, methods and similar changes of the present invention should be included in the protection scope of the present invention.

[0047]The ECC implementation of the present invention is an ECC dedicated coprocessor (IP core) designed based on various applications of the prime number finite field public key algorithm, which can support up to 544bit arbitrary elliptic curve point addition, point subtraction, doubling and point multiplication operations , the elliptic curve equation:

[0048] the y 2 =x 3 +ax+b (4a 3 +27b 2 ≠0) a, b ∈ GF(p)

[0049] In addition to supporting point operations on elliptic curves, the IP also supports finite-field operations such as RSA, modular multiplication, modular addition and subtraction, and modular inversion ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing an elliptic curve cryptosystem algorithm over a prime field in an integrated circuit, relates to the technical field of information encryption, and aims to solve the technical problem of the integrated circuit of a cryptosystem algorithm. The method comprises the flowing flows that: 1) a two-dimensional affine point (x, y) coordinate is mapped to a three-dimensional Jacobin projection coordinate (X, Y, Z); 2) the projection coordinate point is transformed to be expressed by Montgomery, and the transformation process is that (X, Y, Z) is transformed into (XR, YR, ZR), and the point coordinate in the form is applied with point operation operations comprising dot product, point double and point add to obtain the initial result of the point operation (XR, YR, ZR); 3) the projection coordinate result (XR, YR, ZR) is mapped back to an affine coordinate (xR, yR); and 4) the (xR, yR) expressed by the Montgomery is recovered into the (x, y) commonly expressed, wherein all big figures used in the operation are all stored into an SRAM. The method has the characteristics of convenient use, good performance, easy SoC integration, low cost, high performance and small area.

Description

technical field [0001] The invention relates to information encryption technology, in particular to a technology for realizing a prime number field elliptic curve cryptosystem in an integrated circuit. Background technique [0002] Information security, especially in the network environment, has become a major key issue affecting national security, economic development, personal interests, and social stability. From the perspective of protecting the interests of the country and individuals, all governments attach importance to information and network security. In particular, all developed countries have vigorously strengthened the research and supervision of information security. The United States and other western developed countries have formulated new data encryption standards and formulated stricter export policies for information security products. At the same time, major multinational companies such as IBM, HP, Sun, etc. have established powerful information security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30G06F7/72
Inventor 周玉洁朱华
Owner 上海航芯电子科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products