Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pipelined Montgomery Modular Multiplication Algorithm

A pipeline-type, computing method technology, applied in the field of data encryption algorithms, can solve problems such as increased hardware resources, area and energy consumption, difficulty in increasing the number of modular multiplication operations, and decreased cost performance of the system to achieve improved throughput and high performance /Resource ratio, the effect of increasing throughput

Inactive Publication Date: 2019-12-20
南京秉速科技有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of them save resources and area by sacrificing performance, resulting in a decrease in system cost performance and an increase in energy consumption.
A single Montgomery modular multiplication operation takes too long, so if a single Montgomery modular multiplier does not support pipeline, it is difficult to increase the number of modular multiplication operations per unit time, that is, its throughput
A feasible performance improvement solution is to use multiple Montgomery modular multipliers in a computing device, but this will cause a multiplication of hardware resources, area and energy consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pipelined Montgomery Modular Multiplication Algorithm
  • Pipelined Montgomery Modular Multiplication Algorithm
  • Pipelined Montgomery Modular Multiplication Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with specific embodiment:

[0038]The present invention has been implemented in the form of hardware RTL code and implemented into an FPGA-based product. It can also be integrated into asymmetric encryption algorithms and related security hardware ASIC products as IP.

[0039] Montgomery modular multiplication mainly includes two parts. The first part is ordinary multiplication, but because the two numbers to be multiplied are very large (such as 256 or 512 bits), this multiplication must be divided into multiple smaller multiplications for execution.

[0040] Multiplication step 1: If the input bit width of an FPGA ADSP computing unit is U and V respectively, or the ASIC implements a multiplier with a smaller bit width, you can use multiple multipliers with a smaller bit width to implement this step. Suppose the input data ,in , Indicates rounding up and its input data is an R-bit binary number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pipelined Montgomery modular multiplication operation method and a pipelined Montgomery modular multiplication operation device, relates to the technical field of data cryptography algorithms, adopts a pipelined mode to improve Montgomery modular multiplication algorithm performance, increases throughput of a single Montgomery modular multiplier, and consumes less hardware resources and area than a traditional method using a plurality of Montgomery modular multipliers under the condition of the same throughput. Therefore, the modular multiplication number in unit timeis increased by dozens of times, and the Montgomery modular multiplier has higher performance / resource ratio than a non-pipelined Montgomery modular multiplier. Meanwhile, the asymmetric key algorithm hardware using the pipelined Montgomery modular multiplier can achieve higher performance with fewer hardware resources, and the throughput of Montgomery modular multiplication operation of any length is improved.

Description

technical field [0001] The invention relates to the technical field of data encryption algorithms, in particular to a Montgomery modular multiplication operation method and a calculation device. Background technique [0002] Information security is based on security algorithms, and one type of security algorithms is asymmetric key algorithms. The advantage of the asymmetric key algorithm is high security, but the disadvantage is that the encryption speed is much slower than the block cipher, so people have been studying how to improve the operation speed of the asymmetric key algorithm. At present, there are mainly two types of asymmetric key algorithms, one is RSA, and the other is Elliptic Curve Cryptography (ECC). [0003] Among the modular multiplication algorithms, the most efficient and easy-to-implement algorithm is the Montgomery modular multiplication algorithm. During the use of Montgomery modular multiplication, the ordinary number A needs to be converted into t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30G06F7/72
CPCG06F7/725H04L9/3066
Inventor 胡世文沈亚明常洪明马晓涵
Owner 南京秉速科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products