Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware realization method of dual-field modular inversion

A technology of hardware implementation and mold inversion, applied in the field of information security, can solve the problem of fewer chips, achieve the effects of improving computing speed, optimizing hardware area, and saving hardware resources

Active Publication Date: 2018-08-10
北京万协通信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are existing ASICs for the ECC (SM2) algorithm, in which the modular inverse operation of the finite field is an important step in the ECC (SM2) algorithm, and the hardware modular inversion can greatly improve the speed of the ECC (SM2) algorithm. However, there are few chips that implement hardware finite field modular inversion, especially the dual-field modular inversion of two finite fields including prime fields and binary fields.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware realization method of dual-field modular inversion
  • Hardware realization method of dual-field modular inversion
  • Hardware realization method of dual-field modular inversion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.

[0034] Such as figure 1 As shown, the embodiment of the present invention provides a hardware implementation method of dual-domain modular inversion, including the following steps:

[0035] S1, using the hardware description language to build a modular inverse control state machine and a basic operation unit, the basic operation unit includes: a shift operation unit, a modular addition operation unit for a prime field and a binary field, and a modular subtraction for a prime field and a binary field computing unit;

[0036] S2, the modular inversion control state machine follows the modular inve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware realization method of dual-field modular inversion, and relates to the technical field of the information security. The method comprises the following steps: constructing a modular inversion control state machine, modular addition, modular subtraction and shift operation units of two finite fields, and the modular addition, modular subtraction and shift operationunits of two finite fields are called through the modular inversion control state, and the hardware realizes the dual-field modular inversion operation of two finite fields of a prime field and a binary field. Through the method provided by the embodiment of the invention, the algorithm structures of two different finite fields can be integrated at the same time, the operation resource is efficient and reusable, the hardware resource is greatly saved, the operation speed is improved, and a hardware area is optimized.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hardware implementation method of dual-domain modular inversion. Background technique [0002] With the development of computer network and information technology, information security is playing an increasingly important role in various fields, among which cryptography has become the core of information security technology, elliptic curve cryptography (ECC) is a new public key cryptosystem . Compared with the traditional RSA algorithm, under the condition of maintaining the same security strength, the key length required by ECC is shorter, the storage is less, and the calculation is faster. This technical advantage of ECC makes it widely concerned by the cryptography community and the information security industry, and has a good application prospect. [0003] At present, the domestic ECC algorithm includes the SM2 algorithm. The main operation of the ECC (SM2) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08H04L9/06
CPCH04L9/0618H04L9/0825H04L9/3066
Inventor 李艳华张玉禄律博
Owner 北京万协通信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products