Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedded security chip and Montgomery modular multiplication operational method thereof

An operation method and security chip technology, which is applied in the field of asymmetric key algorithm in cryptography, can solve problems such as multi-running time and resources, cost of embedded security chips, etc., and achieve the effect of saving storage space

Active Publication Date: 2015-07-08
SHENZHEN STATE MICRO TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of using Montgomery modular multiplication, ordinary numbers need to be converted into Montgomery numbers, and then the Montgomery modular multiplication operation is performed according to the coefficients. In the conversion process, conversion coefficients are required. The conversion coefficients are generally calculated by the large number modular power algorithm, so that the current Some embedded security chips need to perform complex large number calculations, so the algorithms in the embedded security chip need to spend more running time and resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded security chip and Montgomery modular multiplication operational method thereof
  • Embedded security chip and Montgomery modular multiplication operational method thereof
  • Embedded security chip and Montgomery modular multiplication operational method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the technical problems, technical solutions and beneficial effects solved by the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] The present invention provides a Montgomery modular multiplication operation method of an embodiment embedded security chip, such as figure 1 As shown, the operation method includes the following steps:

[0027] Step S01, obtaining two first preset parameters and a second preset parameter, wherein the first preset parameter is a constant 1;

[0028] Step S02, according to the two first preset parameters and the Montgomery modular multiplication function, the first operation result A is obtained, and the first operation result A=MontF(1,1);

[0029] Step S03, acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an embedded security chip and a Montgomery modular multiplication operational method thereof. The operational method comprises the steps that two first preset parameters and two second preset parameters are obtained, and the first preset parameters are constant one; according to the two first preset parameters and a Montgomery modular multiplication function, a first operation result A is obtained; according to the first operation result A, the first preset parameters, the second preset parameters and a power calculation function, a second operation result B is obtained; according to the first operation result A, the second operation result B and the Montgomery modular multiplication function, a Montgomery modular multiplication conversion coefficient D is obtained; according to a first input parameter NA, a second input parameter NB, the Montgomery modular multiplication conversion coefficient and the Montgomery modular multiplication conversion coefficient, the final modular multiplication result is obtained. According to the Montgomery modular multiplication operational method, a calculation conversion coefficient of a large module power mode can be avoided, the coefficient does not need to be calculated in advance, and the storage space can be saved.

Description

technical field [0001] The invention relates to the field of asymmetric key algorithms in cryptography, in particular to an embedded security chip and its Montgomery modular multiplication method. Background technique [0002] The security guarantee of information security is based on security algorithms, and one type of security algorithms is asymmetric key algorithm. The basic operation of the asymmetric key algorithm is the modular multiplication operation of large numbers. Among the modular multiplication algorithms, the algorithm with high efficiency and easy implementation is the Montgomery modular multiplication algorithm. In the process of using Montgomery modular multiplication, ordinary numbers need to be converted into Montgomery numbers, and then the Montgomery modular multiplication operation is performed according to the coefficients. In the conversion process, conversion coefficients are required. The conversion coefficients are generally calculated by the lar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F7/72
Inventor 陈金强徐浩
Owner SHENZHEN STATE MICRO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products