Unlock instant, AI-driven research and patent intelligence for your innovation.

Elliptic curve cryptosystem (ECC)-algorithm-based implementation method and device for security intellectual property (IP) core

An implementation method and security technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of low security performance and execution efficiency, weak encryption strength, and low efficiency of the RSA encryption algorithm, so as to shorten development time and occupy bandwidth The effect of low, broad application prospects

Inactive Publication Date: 2012-08-01
SUN YAT SEN UNIV
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the acceleration of computer processing speed, the computer's ability to decipher information has been continuously improved, resulting in the continuous lengthening of the RSA key. However, due to the weak encryption strength of the RSA encryption algorithm, a longer key is required when using the RSA encryption algorithm to achieve higher security. In addition, the security performance and execution efficiency of the RSA encryption algorithm are low, and the efficiency in mobile terminal devices with low processing power and storage capacity has poor effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve cryptosystem (ECC)-algorithm-based implementation method and device for security intellectual property (IP) core
  • Elliptic curve cryptosystem (ECC)-algorithm-based implementation method and device for security intellectual property (IP) core
  • Elliptic curve cryptosystem (ECC)-algorithm-based implementation method and device for security intellectual property (IP) core

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] In this application, based on the general design idea of ​​reusability, the elliptic curve encryption algorithm is studied, and the ECC algorithm is realized from the perspective of software and hardware by using the object-oriented design method and the top-down method model. From the software point of view, the realization of ECC algorithm is combined with UML modeling technology, and using the component design method, the final product exists in the form ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an elliptic curve cryptosystem (ECC)-algorithm-based implementation method and an ECC-algorithm-based implementation device for a security intellectual property (IP) core. The method comprises the following steps of: selecting a GF(2n) field-based non-singular normal elliptic curve, wherein the equation form of the elliptic curve is y<2>+xy=x<3>+ax<2>+b; constructing a GF(2n)-based ECC algorithm mode according to the elliptic curve; and constructing the security IP core according to the ECC algorithm mode. The ECC-algorithm-based implementation method and the ECC-algorithm-based implementation device for the security IP core according to the embodiment of the invention has the advantages of high processing speed, small occupied memory space, low occupied bandwidth, high reusability and the like; compared with an RSA-algorithm-based product and a digital signature algorithm (DSA)-based product, the method and the device are higher in private key processing speed (decryption and signature); due to the characteristics of small occupied memory space and low occupied bandwidth, the product has broad application prospect in the field of wireless networks; and the reusability is improved, so that the product can be loaded to a chip or application software under different platforms, the development time of target software can be shortened, and the reliability of the target software can be improved.

Description

technical field [0001] The invention relates to the technical field of network communication security, in particular to a method and device for realizing a security IP core based on an ECC algorithm. Background technique [0002] At present, the elliptic curve encryption algorithm has been implemented abroad, and many standard documents on elliptic curves such as: IEEE P1363, P1363a, ANSIX9.62X9.63, ISO / IEC14888 have been formulated one after another. However, the application of Elliptic Curve Cryptosystems (ECC) to encryption middleware products is still blank, and the research on ECC-based encryption products is still in its infancy and research stage. [0003] In the national wireless LAN standard GB15629.11 promulgated by China in 2003, the new WAPI security mechanism is based on the elliptic curve encryption algorithm, which also indicates that information security products based on the elliptic curve encryption algorithm will be my country's future wireless LAN communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
Inventor 盛建强罗笑南孟思明
Owner SUN YAT SEN UNIV