Unlock instant, AI-driven research and patent intelligence for your innovation.

Elliptic Curve Cryptography Method Including Error Detection

A kind of elliptic curve encryption and elliptic curve technology, which is applied in the countermeasures of attacking encryption mechanism, the public key of secure communication, instruments, etc.

Active Publication Date: 2020-08-28
RAMBUS INC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it may not be effective to detect error injection only at the end of computation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic Curve Cryptography Method Including Error Detection
  • Elliptic Curve Cryptography Method Including Error Detection
  • Elliptic Curve Cryptography Method Including Error Detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Elliptic curve cryptosystems generally require the definition of so-called "domain" parameters. In GF(p) or GF(2 m ) type Galois field, these parameters include: a large prime number p or a large integer m; the generation point or base point G of coordinates Gx and Gy in the Galois field; the prime number n called "order" of point G, such that is the point at infinity or the neutral element in the Galois field; the parameters defining the elliptic curve; the number f called the "cofactor", generally equal to 1, 2, or 4, so that f·n represents the number of points of the elliptic curve. In a Galois field of type GF(p), an elliptic curve may for example have a shape such as E(a,b):y 2 =x 3 The equation of +ax+b. In this elliptic curve, the opposite point of a point P with affine coordinates (x, y) is a point -P with coordinates (x, -y).

[0026] figure 1 Represented in the form of a block diagram is an electronic device DV1 configured to perform cryptographic calc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cryptographic calculation method in an elliptic curve encryption system, which is performed by an electronic device (DV1) and includes a multiplication operation of a point (P) of an elliptic curve having a value belonging to a Galois field by a scalar For affine coordinates, the multiplication operation includes the steps of: detecting the occurrence of a point at infinity during an intermediate calculation (ADD, DBL) of the multiplication operation; and if an infinity point is detected, and if the number of bits of the scalar processed by the multiplication operation is lower than The level of the most significant bit of the order of the base point of the encryption system activates the error signal.

Description

technical field [0001] The present invention relates to the implementation of elliptic curve encryption methods in electronic devices, and in particular to the detection of attacks by such devices during the execution of cryptographic calculations. Background technique [0002] Various known elliptic curve encryption methods are based on scalar multiplication whose mathematical expression is: (k times), P is the point selected on the elliptic curve, k is an integer, is an addition operator applied to points of an elliptic curve. The number k can be used, for example, as a private key, the point obtained from this operation Or one of the affine coordinates of the point can be used as the public key corresponding to the private key k. In fact, from the result Finding the value of the number k in the coordinates of and point P is very difficult, especially when the number k and the coordinates of point P are chosen high enough. This operation is used, for example, duri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
CPCG06F7/725G06F2207/7271H04L9/004H04L9/3066
Inventor V·杜帕奎斯
Owner RAMBUS INC