Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realizing method of elliptic curve cryptography arithmetic device in authentication system

An elliptic curve cryptography and authentication system technology, applied in the field of secure access to wireless communication systems, can solve problems such as increasing the cost of system deployment

Inactive Publication Date: 2013-11-06
GCI SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the above-mentioned typical authentication server cluster system, the overall performance can be adjusted by configuring several ECC computing devices with different performance levels, or configuring redundant devices to adapt to the burst characteristics of authentication request services, and these measures will increase the deployment of the system cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing method of elliptic curve cryptography arithmetic device in authentication system
  • Realizing method of elliptic curve cryptography arithmetic device in authentication system
  • Realizing method of elliptic curve cryptography arithmetic device in authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0156] The technical scheme of optimizing the parameter set (L=h; m=M) of the ECC computing device can be designed as follows:

[0157] Firstly, the DSP kernel in the system is divided into L operation unit groups. It is assumed that these groups of operation units can use different parameters m, where the number of divisions of each dot multiplication operation unit is marked as m l , l=1, 2,..., L, they form a set M={m l |l=1, 2, ..., h}.

[0158] Define the number of equivalent segments as m l The mathematical expectation of :

[0159] m eff = E ( m l ) = Σ l m l L ,

[0160] For L dot multiplication units, it can be constructed Combinations, select several combinations correspond...

Embodiment 2

[0180] Embodiment 2 is to embodiment 1 when m eff It is an integer, that is, for the same parameter group, it is divided into L operation unit groups, and the segment number m of each operation unit group is all the same. According to the agreement, the parameter group (L=h; m=M) can be abbreviated as ( L=h; m=m 0 ), where m 0 = m 1 = m 2 =…=m L .

[0181] To the parameter group (L=h; m=m of ECC computing device 0 ) to optimize the technical scheme can be designed as follows:

[0182] For the given system parameter nT and other necessary explanations, a mathematical model is established for the system, and then the simulation is carried out by the Monte Carlo method according to the different conditions of m∈M, respectively according to the specified Q avg and σ parameters to generate authentication request input samples, and then simulate the concurrent processing process and strategy of the input samples by the DSP core, and obtain the timeout probability p of authent...

Embodiment 3

[0201] Embodiment 3 is a special case of Embodiment 2. When the authentication server system works under light load conditions, for example, the number of authentication requests waiting is less than the preset threshold value Q th , a reasonable assumption can be made at this point: the timeout probability of authentication request processing p≈0. Under this condition, for the parameter set (L=h; m=m 0 ) The optimized technical scheme can also be designed as follows:

[0202] According to the simulation analysis and combined with engineering experience, the following parameter constants are determined: q 1 ,q 2 ,q 3 ,q 4 , and its unit is the number of authentication requests / second. These constants should satisfy the condition: q 1 2 3 4 th . Record and calculate the average number of authentication requests Q received by the authentication server system per second in a pre-designed statistical period (such as 60 minutes) avg , and then according to the attached Fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of secure access of a wireless communication system, in particular relating to a realizing method of an elliptic curve cryptography arithmetic device in an authentication system, comprising the following steps: using a key algorithm on the basis of a predefined elliptic curve, and selecting a point P on the elliptic curve; generating a large-number random variable K with n bits for each authentication request; and completing a dot multiplication of the points P and k corresponding to each authentication request, wherein the dot multiplication is equivalently transformed into an algorithm form with a characteristic of concurrent execution; at least one set of arithmetical elements are determined according to a segment rule; an segmentation and recombination operation is executed to each set of arithmetic elements. Under the condition that the number of the subscriber authentication request is less, a system resource can be fully utilized to shorten the processing delay of a single authentication request to improve the subscriber experience; and under the condition that the number of the subscriber authentication request is more, the possibility that the subscriber authentication request processing is overtime can be reduced by adding concurrent processing number, so that the purpose of balancing a contradiction between the single authentication request processing delay and the concurrent processing number is achieved.

Description

technical field [0001] The invention relates to the technical field of secure access to wireless communication systems, in particular to a method for realizing an elliptic curve cryptographic operation device in an authentication system. Background technique [0002] The authentication server is the core network element of the secure access technology in the wireless communication system, and is used to identify the identities of other network elements (base stations, terminals, etc.) that access the network. Patent application number 200810027930.0 "A Secure Access Method for Wireless Metropolitan Area Network" provides an identity authentication process for secure access to a wireless communication system, which describes the basic process for the authentication server to complete identity authentication, including receiving certificate authentication Steps such as requesting a message, verifying the message signature, verifying the X.509 digital certificate identifying th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04L9/30H04W12/069
Inventor 张永强
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products