Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for modular exponentiation

An operation method and modular exponentiation technology, applied in the field of modular exponentiation, can solve the problem of high power consumption of modular exponentiation devices, and achieve the effects of preventing power consumption analysis, reducing power consumption, and reducing the number of times.

Active Publication Date: 2018-11-06
SHANGHAI FUDAN MICROELECTRONICS GROUP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be known from the above scheme that the controller needs to judge the value of each data bit in the binary data stream, and according to the value of the data bit, schedule the operator to start the corresponding operation. The realization of the entire modular exponentiation operation needs to be controlled The device participates in a large amount of scheduling work, resulting in a large power consumption of the modular exponentiation device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for modular exponentiation
  • Method and device for modular exponentiation
  • Method and device for modular exponentiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] This embodiment provides a modular exponentiation method, referring to figure 1 , which will be described in detail below through specific steps.

[0037] In step S101, the controller selects a data stream to be processed, and stores the data stream into a first memory.

[0038] In a specific implementation, the data stream to be processed may be a binary bit stream, and the first memory may be a register for storing the data stream to be processed, or may be other types of memory.

[0039] Step S102, the modular exponentiation operator sequentially acquires the data bits in the first memory, and when the value of the data bits is 1, performs the first operation, and stores the result of the first operation in the second memory; when the data When the value of the bit is 0, the second operation is performed, and the result of the second operation is stored in the second memory.

[0040] In a specific implementation, the first operation may include the following operat...

Embodiment 2

[0046] This embodiment provides a modular exponentiation method, referring to figure 2 , which will be described in detail below through specific steps.

[0047] Step S201, the controller selects a data stream to be processed, and stores the data stream into a first memory.

[0048] In a specific implementation, the first memory may store data streams that need to be processed. The length of the data stream is N, and the length of a data stream may be 32 data bits or an integer multiple of 32.

[0049] Step S202, initializing the preset counter in the modular exponentiation operator.

[0050] The modular exponentiation operator can sequentially read the data bits in the first memory. In a specific implementation, a counter can be set in the modular exponentiation unit, and the number of data bits currently read by the modular exponentiation unit can be judged by the value of the counter. The length of the counter is the same as the length of the data stream to be processe...

Embodiment 3

[0066] This embodiment provides a modular exponentiation method, referring to image 3 , which will be described in detail below through specific steps.

[0067] Step S301, the controller selects a data stream to be processed, and stores the data stream into a first memory.

[0068] Step S302, initializing the counter preset in the modular exponentiation operator.

[0069] The modular exponentiation operator can sequentially read the data bits in the first memory. In a specific implementation, a counter can be set in the modular exponentiation unit, and the number of data bits currently read by the modular exponentiation unit can be judged by the value of the counter. The length of the counter is the same as the length of the data stream to be processed, and the value of the counter is initialized to 1.

[0070] Step S303, the modular exponentiation operator reads the data bits in the first memory.

[0071] Step S304, judging whether the value of the first data bit is 1, i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for modular exponentiation operation. The method comprises the following steps: a controller selects data flow to be processed and stores the data flow in a first storer; a modular exponentiation operational unit reads data bit in the first storer; when the value of the data bit is 1, a first operation is performed, and the result of the first operation is stored in a second storer; when the value of the data bit is 0, second operation is performed, and the result of second operation is stored in the second storer. By adoption of the method and the device, the power consumption of the modular exponentiation operation device can be effectively reduced.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a method and device for modular exponentiation. Background technique [0002] With the widespread application of smart cards, the application of security algorithms is becoming more and more extensive. The RSA public key encryption algorithm is currently the most influential public key encryption algorithm. The security of RSA is based on the difficulty of large number decomposition. [0003] The core calculation of the RSA algorithm is the modular exponentiation operation. In the existing modular exponentiation devices, the modular exponentiation is generally realized through a controller and an arithmetic unit, wherein the arithmetic unit is realized by hardware. The implementation process of modular exponentiation can be described as follows: the controller selects the binary data stream to be processed, and judges whether the value of the first data bit of the binary data str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
Inventor 闫守礼张志敏宁兆熙王立辉李清张纲刘枫
Owner SHANGHAI FUDAN MICROELECTRONICS GROUP