Elliptic curve cryptosystem (ECC)-algorithm-based implementation method and device for security intellectual property (IP) core
An implementation method and security technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of low security performance and execution efficiency, weak encryption strength, and low efficiency of the RSA encryption algorithm, so as to shorten development time and occupy bandwidth The effect of low, broad application prospects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0032] In this application, based on the general design idea of reusability, the elliptic curve encryption algorithm is studied, and the ECC algorithm is realized from the perspective of software and hardware by using the object-oriented design method and the top-down method model. From the software point of view, the realization of ECC algorithm is combined with UML modeling technology, and using the component design method, the final product exists in the form ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 