Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Finite field inversion method based on hardware design and device thereof

A hardware design and finite field technology, applied in the field of elliptic curve cryptography, can solve problems such as limiting system processing capacity, power consumption, and inconvenience

Inactive Publication Date: 2009-11-04
陈婧 +3
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increasing development of cryptography applications, in the application of some high-speed and low-power electronic devices, such as smart cards, personal computer memory cards, or any other handheld or portable devices, such algorithms still limit the processing of the entire system. Capacity and Power Consumption
[0008] In summary, the existing finite field inversion scheme applied to the elliptic curve encryption system obviously has inconvenience and defects in actual use, so it is necessary to improve it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Finite field inversion method based on hardware design and device thereof
  • Finite field inversion method based on hardware design and device thereof
  • Finite field inversion method based on hardware design and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0086] The basic idea of ​​the present invention is: the finite field GF(p m ) or GF (2 m ) as the input element a, and define an irreducible polynomial f(x), then repeatedly multiply or divide the input element a and the irreducible polynomial f(x) by x 2 And add, after m cycles, output the multiplicative inverse a of the input element a -1 . Thereby, the present invention can reduce the operation cycle, and further greatly improve the inverse operation efficiency.

[0087] figure 1 It shows the application of the finite field inversion device of the present invention in the elliptic curve en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a finite field inversion method based on hardware design, which is applicable to an elliptical curve encrypt system. The method comprises the following steps: using a monadic polynomial in a finite field GF(p) as an input element a and defining an irreducible polynomial f(x), wherein a=am-1x+am-2x+to +a1x+a0, f(x)x=+fm-1xx+to +f(1)+f(0), ai and fi are respectively the coefficients of the input element a and the irreducible polynomial f(x); the input element a being repeatedly multiplied or divided by x and adding the results, and outputting the multiplicative inverse a of the input element a. Correspondingly, the invention further provides a finite field GF(2) inversion device based on the hardware design, therefore, the invention ensures rapider calculation speed, thereby greatly improving inversion operating efficiency. In addition, the working frequency of the inversion device is close to that of other operation devices in the encrypt system so as to fully improve the hardware source utilization rate of the inversion device.

Description

technical field [0001] The invention relates to elliptic curve encryption technology, in particular to a method and device for inverting a finite field based on hardware design in an elliptic curve encryption system. Background technique [0002] Elliptic Curve Cryptography (Elliptic Curve Cryptography, ECC) was proposed by Victor Miller and Neal Koblitz in 1985. Its advantage is that it provides the same security as other cryptosystems and has a smaller key size, so it is currently known It is a public key system that can provide the highest bit strength among all public key cryptosystems in the world. Smaller key size means reduced memory requirements and reduced computing time, especially suitable for low power consumption and high-speed encrypted security applications, such as smart cards, personal computer memory cards, or any other types of handheld or portable devices application. The public key encryption algorithm standard P1363 established by IEEE (Institute of E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30G06F7/72
Inventor 陈婧蒋俊洁王石邓小铁
Owner 陈婧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products