Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing scalar multiplication in chip and computer readable storage medium

An implementation method, a technology of scalar multiplication, applied in the field of information security, can solve problems such as irresistibility, and achieve the effect of ensuring security

Active Publication Date: 2019-04-05
DATANG MICROELECTRONICS TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the execution of the existing comb algorithm, "non-zero window" and "zero window" will appear, and the attacker can observe the difference between the "non-zero window" and "zero window" on the power consumption curve through an oscilloscope. Analysis to obtain partial scalar information, so the existing comb algorithm cannot resist Simple Power Analysis (SPA) attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing scalar multiplication in chip and computer readable storage medium
  • Method and device for realizing scalar multiplication in chip and computer readable storage medium
  • Method and device for realizing scalar multiplication in chip and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0043] Finite field Fp There are two commonly used representations of elliptic curves on : affine coordinate representation and projective coordinate representation.

[0044] (1) Affine coordinate representation

[0045] When p is a prime number greater than 3, F p The elliptic curve equation on can be expressed in the affine coordinate system as:

[0046] the y 2 =x 3 +ax+b, where a, b∈F p , and satisfy (4a 3 +27b 2 )mod p≠0;

[0047] The set of points on the elliptic curve is denoted as E(F p )={(x,y)|x,y∈F p and satisfy the curve equation y 2 =x 3 +ax+b}∪{O}, w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Method and device for realizing scalar multiplication in chip and computer readable storage medium. The method comprises the steps that parameters of a first scalar k, a fixed coordinate point P, a window width w and an elliptic curve E (Fp) are acquired; The method comprises the following steps: obtaining a positive integer r, generating a positive integer r which belongs to Fp, calculating the number of windows, m being binary bit lengths k and r respectively, adding r * n to k, and subtracting (2d-n) from the k, The method comprises the following steps: 1) assigning a second scalar k'to an obtained result, wherein n is an order of an elliptic curve base point; Encoding k'into an array C 'comprising d elements corresponding to a binary bit sequence of each column in a matrix of w rows and d columns converted from k'; And using the element C '[i] in the array C' and the fixed coordinate point P to circularly execute a multiple point operation Q2Q and a pointaddition operation QQ + C '[i] P + P, and outputting a circulation result. According to the method, the SPA attack resistance and the fault attack resistance are completely realized by setting the point multiplication operation and the point addition operation once in each cyclic calculation process.

Description

technical field [0001] The present invention relates to but not limited to the technical field of information security, and in particular relates to a scalar multiplication implementation method and device in a chip, and a computer-readable storage medium. Background technique [0002] With the development of computer technology and the continuous improvement of social informatization, information security issues have been paid more and more attention by people. Elliptic curve cryptography (Elliptic curve cryptography, ECC) has the advantages of high security, fast calculation speed, small storage space, low bandwidth requirements, and few calculation parameters compared with traditional public key encryption algorithms, and has been widely used in field of information security. [0003] The scalar multiplication operation is a core operation step in the elliptic curve public key cryptosystem, and it is also the most time-consuming operation step. Comb method is a fast alg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F7/523G06F7/58
CPCG06F7/523G06F7/588
Inventor 张启雨王欣
Owner DATANG MICROELECTRONICS TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More