High-speed multiple-point operation method for elliptic curve passwords

An elliptic curve cryptography and computing method technology, applied in the field of elliptic curve cryptography, can solve the problems of decreased system cost performance, increased energy consumption, inability to perform parallel operations, etc., to achieve improved throughput, improved system performance, optimal performance and resource utilization Effect

Inactive Publication Date: 2019-09-13
南京秉速科技有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method also has its limitations, because many modular multiplication operations have certain data dependencies, and they cannot be completely parallelized.
At the same time, this method needs to use more than double the hardware resources every time the performance is doubled, resulting in a decrease in the cost performance of the system and an increase in energy consumption, such as figure 1 The hardware timing of the non-pipelined doubling point shown in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-speed multiple-point operation method for elliptic curve passwords
  • High-speed multiple-point operation method for elliptic curve passwords
  • High-speed multiple-point operation method for elliptic curve passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described below in conjunction with specific embodiment:

[0059] Such as Figure 4 , under the Jacobian projection coordinates, one doubling operation executes 9 modular multiplication operations, using a double-pipelined Montgomery modular multiplier and four pipelined adders. Multiple operation requests can be continuously accepted each time, and each request is in a different clock cycle. Until the first request result of the batch is output, the point multiplier will not accept new operation requests. The steps of the operation method are Serially, the specific steps are as follows:

[0060] S0: idle until input data (x, y, z) is obtained;

[0061] S1: In the first calculation cycle, the calculations of each step are performed simultaneously, the adder 1 calculates t3=y+z, the modular multiplier 1 calculates d=z*z, and the modular multiplier 2 calculates g=y*y;

[0062] S2: In the second calculation cycle, the calculations o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-speed multiple-point operation method for elliptic curve passwords, which is realized by adopting an assembly line type Montgomery modular multiplier matched with an adder, executing N clock periods by one modular multiplier to obtain a result, and sending N different operations to the modular multiplier in N continuous clock periods; and in the previous clock periodof the first operation result, sending the input of the Nth operation into the modular multiplier. The invention utilizes the flow characteristics of the pipelined Montgomery modular multiplier, subtly multiplexes the underlying pipelined hardware circuit, and simultaneously performs multiple multiplication operations in a batch manner, and the throughput of a whole system is improved by severalorders of magnitude.Therefore, the performance / hardware resource ratio and the performance / energy consumption ratio are improved by several times or even dozens of times compared with those in the prior art. Meanwhile, the optimal number of Montgomery modular multipliers and modular adders is selected by analyzing the characteristics of a multiple point algorithm, and the optimal configuration ofperformance and resource use is achieved.

Description

technical field [0001] The invention relates to the technical field of elliptic curve cryptography systems, in particular to a high-performance integrated circuit method for doubling points of elliptic curve cryptography. Background technique [0002] Information security is based on security algorithms, and one type of security algorithms is asymmetric key algorithms. The advantage of the asymmetric key algorithm is high security, but the disadvantage is that the encryption speed is much slower than the block cipher, so people have been studying how to improve the operation speed of the asymmetric key algorithm. At present, there are mainly two types of asymmetric key algorithms, one is RSA, and the other is Elliptic Curve Cryptography (ECC). [0003] Elliptic Curve Cryptography (ECC) was proposed by N.Koblitz and V.Miller in 1985. It is a kind of cryptographic system obtained by replacing the finite cyclic group in the discrete logarithm problem with the elliptic curve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F7/544
CPCG06F7/5443G06F21/602
Inventor 胡世文沈亚明常洪明田涛
Owner 南京秉速科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products