Supercharge Your Innovation With Domain-Expert AI Agents!

rsa modular power circuit and rsa security encryption chip

A modular exponentiation and circuit technology, applied in the field of RSA security encryption chip, can solve the hidden dangers of key security and other problems, and achieve the effect of resisting power consumption analysis attacks, resisting security error attacks, and ensuring security

Active Publication Date: 2017-03-01
SHENZHEN ZHENGTONG ELECTRONICS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It can be seen that the existing RSA security encryption chip may effectively steal the key due to the side-channel attack on the hardware, so that the security of the key is hidden.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • rsa modular power circuit and rsa security encryption chip
  • rsa modular power circuit and rsa security encryption chip
  • rsa modular power circuit and rsa security encryption chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below in conjunction with the best embodiment shown in the accompanying drawings, it will be further described in detail.

[0024] see figure 1 , The structure of the RSA modular exponentiation circuit of the present invention roughly includes: a modular exponentiation controller 1, a modular multiplication controller 2 and a systolic array 3 three modules. Wherein, the modular exponentiation controller 1 can control the whole process of the modular exponentiation operation, including the startup of the modular multiplication controller 2 and the data input and output of the systolic array 3 . The modular multiplication controller 2 can control the systolic array 3 to complete the modular multiplication operation. The systolic array 3 realizes the modular multiplication operation, and outputs the data to the modular exponentiation controller 1 .

[0025] Preferably, the systolic array 3 implements a Montgomery modular multiplication operation. In other embodiments, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an RSA modular exponentiation circuit and an RSA security encryption chip. The RSA modular exponentiation circuit comprises a modular exponentiation controller, a modular multiplication controller and a pulse array, wherein the modular exponentiation controller can control the whole process of modular exponentiation, and the whole process of the modular exponentiation includes start of the modular multiplication controller and data input / output of the pulse array, the modular multiplication controller can control the pulse array to finish modular multiplication, the pulse array achieves the modular multiplication and outputs data to the modular exponentiation controller. The RSA modular exponentiation circuit and the RSA security encryption chip can effectively resist power consumption analysis attack and security error attack, and ensure safety of an inner secret key of the RSA security encryption chip.

Description

technical field [0001] The invention relates to an integrated circuit, in particular to an RSA security encryption chip. Background technique [0002] RSA security encryption chips are widely used in various fields of society, such as smart cards and bank password cards. Therefore, it is of great significance to protect the secret information in the chip. RSA public key encryption algorithm is a very famous and widely used public key system. The basis of the security of RSA is that the prime factors of large integers are difficult to solve. So far, no one has proposed an effective mathematical method to effectively solve this problem. At present, implementing side-channel attacks on security chips has become a common means of stealing keys in chips. Power consumption analysis is one of the side-channel attacks, which poses a great threat to security chips. [0003] Kocher et al. proposed a simple power analysis, which was later successfully used to attack the RSA algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F7/72
Inventor 刘彦首南青宋丹李肯立秦云川沈案
Owner SHENZHEN ZHENGTONG ELECTRONICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More