Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Modular multiplication device and method

A kind of equipment, technology of multiplication, applied in the field of modular multiplication method and equipment

Active Publication Date: 2017-08-11
SECURE IC
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] However, it has been observed that sequences of multiplications can still be guessed, although they manipulate unknown data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Modular multiplication device and method
  • Modular multiplication device and method
  • Modular multiplication device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Embodiments of the present invention provide an improved modular multiplication method and apparatus for determining the result of a modular multiplication of two multiplicands, each of which includes a plurality of numbers.

[0062] Embodiments of the present invention further provide cryptographic systems and methods that use the results of such modular multiplication methods and devices in cryptographic operations to ensure protection of cryptographic systems and methods from attacks conventionally based on the observation of additional reductions. Exemplary cryptographic operations include encryption, decryption operations, signing and authentication operations. For purposes of illustration only, the following description of certain embodiments will be made with reference to, for example, encryption and / or decryption operations.

[0063] refer to figure 1 , represents a cryptographic system 100 according to some embodiments of the present invention. The cryptograp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

There is provided a modular multiplication device for performing a multiplication of a first multiplicand and a second multiplicand modulo a given modulus, each of the multiplicand comprising a given number of digits, each digit having a given word size. The modular multiplication device comprises: - a multiplier for multiplying at least one digit of the first multiplicand with the second multiplicand to produce a multiplier output; - a modular reduction unit configured to reduce a quantity derived from the multiplier output by the product of an extended modulus and an integer coefficient, the extended modulus being the product of the given modulus with an extension parameter, which provides a reduction output, the reduction output being a positive integer strictly smaller than the extended modulus, wherein the modular multiplication device further comprises a selection unit configured to select the extension parameter such that the time taken for the device to perform the multiplication is independent from the multiplicands.

Description

Background technique [0001] The present invention generally relates to data processing, and more particularly relates to a modular multiplication method and device. [0002] Modular multiplication is used in many fields, especially in data security systems such as cryptographic systems. Cryptographic systems use cryptographic schemes that depend on modular multiplication between long integer multipliers. The performance of the whole cryptographic system closely depends on the optimization of modular multiplication. [0003] Cryptography systems are widely used in many products, such as embedded devices, smart cards, to ensure the privacy and authenticity of messages transmitted via non-secure channels. Asymmetric cryptosystems (also known as "public key" cryptosystems) use a pair of keys consisting of a public key and a private key to encrypt and decrypt a message in order to ensure that the message arrives securely without being intercepted by unauthorized users . [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/30H04L9/08
CPCH04L9/003H04L9/004H04L9/0825H04L9/302H04L9/3033H04L9/3066G06F7/728G06F2207/7261G06F7/722H04L9/14H04L9/304H04L9/3249
Inventor S·吉耶C·穆尔迪卡
Owner SECURE IC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products