A low-cost digital signature sopc design method based on rsa and sha-512

A SHA-512, digital signature technology, applied in digital transmission systems, public keys for secure communications, encryption devices with shift registers/memory, etc. Product versatility and other issues, to achieve the effect of improving computing speed, resisting side-channel attacks, and low cost

Active Publication Date: 2021-01-19
SOUTH CHINA UNIV OF TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, RSA implemented by hardware also has defects. The first is that it is troublesome to change and upgrade the algorithm, and it is not even compatible with RSA with different lengths, which limits the versatility of the product. limited attack capability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A low-cost digital signature sopc design method based on rsa and sha-512
  • A low-cost digital signature sopc design method based on rsa and sha-512
  • A low-cost digital signature sopc design method based on rsa and sha-512

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the present invention will be further described below in conjunction with the embodiments and accompanying drawings, but the implementation and protection of the present invention are not limited thereto. Those skilled in the art can realize and understand with reference to the prior art.

[0026] The system block diagram of this example is as follows figure 1 , the system is generated using ALTERA's tool Qsys, and the signature and verification process will be further detailed below.

[0027] In the RSA private key and modulus on-chip ROM, NiosII reads the secret key and modulus through the avalon interface when the system is running, and the modulus is sent to the modulus module through the avalon interface after blinding N’=K*N. Among them, N is the correct modulus, K is a small random number, and N' is the result of blinding. The private key is stored in memory for later use.

[0028] The signing process is as Figure 4 As shown, the system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a low cost digital signature SPOC design method based on RSA and SHA-512. An in-chip MCU uses a soft core NiosII of an ALTERA to perform hardware and software partitioning on the RSA and SHA-512 according to operation characteristics; a software part comprises interaction with off-chip data, RSA modular exponentiation, and SHA-512 data filling; hardware finishes RSA modular multiplication, a modular addition operation, a modular inversion operation and an operation for taking 80 rounds as a subunit in the SHA-512. The low cost digital signature SPOC design method based on RSA and SHA-512 utilizes parallelism of hardware calculation to obtain a high speed operation result, uses flexibility of software to guarantee an attack resisting capability of a system, can support different RSA lengths and calculation modes of different HASH functions. Functionally, the low cost digital signature SPOC design method based on RSA and SHA-512 can be used for digital autographing and identity authentication.

Description

technical field [0001] The invention relates to the field of cryptographic chip design, in particular to a low-cost digital signature SOPC (programmable system on chip) design method based on RSA and SHA-512. Background technique [0002] The RSA public key encryption algorithm was proposed in 1977. It can be conveniently used in key exchange and digital signatures. It can resist all cryptographic attacks so far, and has been recommended by ISO as a public key encryption standard. SHA is a series of cryptographic hash functions designed by the National Security Agency (NSA) and released by the National Institute of Standards and Technology (NIST), which can effectively calculate the hash value of a piece of data and ensure its one-way. [0003] Digital signatures are frequently used in current e-commerce, official document circulation and other occasions. The main method is to perform HASH operation on the file to be signed first, obtain the hash value of the file, and then ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/30H04L9/32
CPCH04L9/0643H04L9/302H04L9/3215H04L9/3247
Inventor 吴朝晖李泽祥李斌
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products