Method for processing RSA password based on residue number system and coprocessor

A technology of remainder system and processing method, which is applied in the direction of calculation using non-number system representation and calculation using residual algorithm, which can solve the problems of high data processing degree and difficult to obtain.

Active Publication Date: 2011-11-02
PHYTIUM TECH CO LTD
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The algorithm of the RSA cryptosystem is not complicated, but it relies on the modular exponentiation operation of long integers, and it is difficult to obtain a relatively high degree of data processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing RSA password based on residue number system and coprocessor
  • Method for processing RSA password based on residue number system and coprocessor
  • Method for processing RSA password based on residue number system and coprocessor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The Montgomery modular multiplication algorithm based on RNS (Residue Number System) is an effective implementation of the RSA algorithm. The basic operations in Montgomery's modular multiplication are addition and multiplication. The advantage of RNS is that addition, subtraction, and multiplication are very simple decimal operations, which can independently calculate each element in RNS, which enables the combination of Montgomery multiplication and RNS algorithm to achieve fast parallel processing.

[0077] The present invention is a cryptographic processor with a TTA-Like architecture, which makes full use of the parallelism of RNS to realize the RSA algorithm. By designing a special modular multiplication unit and utilizing the cascading between functional units, the RSA processing efficiency is effectively improved. decryption performance.

[0078] The present invention is an RSA cryptographic coprocessor based on the remainder system. Studies have shown that in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to information technology security and microprocessor design. Aiming at increasing RSA (Ron Rivest, Adi Shamirh and LenAdleman) modular multiplication operation speed and improving RSA encryption and decryption performances, the invention provides the technical scheme as follows: a method for processing an RSA password based on a residue number system comprises the followingsteps of performs encryption and decryption operations by using an RSA algorithm and performing large-number modular exponentiation of the RSA algorithm by using an L-R (Left-Right) binary scanning modular power algorithm; an improved Montgomery algorithm is specifically as follows: 1024-bit large numbers with are expressed as numbers under the residue number system, namely two sets of 33 32-bit decimal numbers and one 32-bit number expressed under a redundancy base; an expression process is a mould solving process; the decomposed 32-bit decimal numbers respectively participate in 32-bit modular multiplication, modular multiplication accumulation and modular addition operation independently; furthermore, 32-bit data performs parallel execution operation without dependence; and the method disclosed by the invention is mainly applicable for the information technology security and microprocessor design.

Description

technical field [0001] The present invention relates to information technology security and microprocessor design. Specifically, it relates to an RSA cryptographic coprocessor based on a remainder system. Background technique [0002] The RSA public key encryption algorithm was developed in 1977 by Ron Rivest, Adi Shamirh and Len Adleman (MIT, USA). RSA takes its name from the names of the three who developed them. [0003] With the development of computer network and information technology, information security is playing an increasingly important role in various fields, among which cryptography has become the core of information security technology. RSA is currently recognized as the most mature and perfect public key cryptosystem in theory and practical application. It is based on the difficulty of factoring large integers to ensure the security of RSA algorithm. At present, most encryption and digital signatures using public key cryptography use the RSA algorithm. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F7/72
Inventor 郭炜白松辉苏蛟刘亚灵魏继增
Owner PHYTIUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products