RSA private key mask operation method, coprocessor and RSA arithmetic device

A technology of coprocessor and computing method, applied in the field of electronics, can solve the problem of consuming a lot of time and resources

Inactive Publication Date: 2018-06-01
北京融通高科微电子科技有限公司
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to provide a kind of RSA private key mask operation method, coprocessor and RSA operation device,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSA private key mask operation method, coprocessor and RSA arithmetic device
  • RSA private key mask operation method, coprocessor and RSA arithmetic device
  • RSA private key mask operation method, coprocessor and RSA arithmetic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] At present, the commonly used protection methods include mask (including bottom mask, mask finger and mask, etc.), equalized modular multiplication and modular square, etc. The commonly used masking method requires a pair of reciprocal random numbers, which requires the processor to perform modular inverse operations, and the modular inverse operations consume a lot of time an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a RSA private key mask operation method, a coprocessor and a RSA arithmetic device, wherein when a controller receives a start operation instruction sent by a master processor,the controller acquires a to-be-decrypted content m, a random number r, a public key e, a private key d and a modulus n of a RSA algorithm, and sends the decrypted content to the master processor; a modular adder calculates e-1 and calculates d-1; a modular exponentiation device calculates r<e-1>modn based on the e-1, calculates (mr<e>)<d-1>modn based on the mr<e>modn and the d-1; a modular multiplier calculates mr<e-1>modn based on the r<e-1>modn, calculates mr<e-1>.rmodn based on the mr<e-1>modn to obtain mr<e>modn, and calculates (mr<e>)<d-1>.mr<e-1>modn based on the (mr<e>)<d-1>modn and the mr<e-1>modn to obtain m<d>modn, and sends the decrypted content of the m<d>modn to the controller, thus, technical effects of reducing mask base cost, having relatively higher security in aspects, such as resisting side channel attacks and resisting fault attacks, are achieved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an RSA private key mask operation method, a coprocessor and an RSA operation device. Background technique [0002] As the most influential public key cryptographic algorithm, RSA algorithm is widely used in mobile communication, network transmission, e-commerce and other fields. Among them, RSA private key operation is the most frequently used, and unprotected RSA operation may be attacked by SPA (simple energy analysis), DPA (differential energy analysis), CPA (correlation energy analysis), etc. [0003] At present, the commonly used protection methods include mask (including bottom mask, mask finger and mask, etc.), equalized modular multiplication and modular square, etc. The commonly used masking method requires a pair of reciprocal random numbers, which requires the processor to perform modular inverse operations, and the modular inverse operations consume a lot of time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/00
CPCH04L9/003H04L9/004H04L9/302
Inventor 马帅何中林
Owner 北京融通高科微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products