Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Fast Encryption System Based on Four-Base Binary Modulo Operation

An encryption system and modular computing technology, applied in the transmission system, digital transmission system, user identity/authority verification, etc., can solve the problems of large computing time and computing resources, data source signature verification delay, and high computing complexity. Achieve the effect of shortening the operation cycle and saving operation time

Active Publication Date: 2021-08-17
GUANGDONG UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the common elliptic curve encryption algorithm requires multiple operation modules (modular addition and subtraction, modular inversion, modular multiplication, point addition, point doubling, scalar multiplication, and protocol layer), and its computational complexity is relatively high. Processing, the ordinary elliptic curve encryption system will consume huge computing time and computing resources, resulting in particularly serious delays in data source encryption and decryption and signature verification, which greatly limits the application scenarios of elliptic curve encryption algorithms, and even endangers the encryption system. Timing environment, resulting in a series of design problems such as internal dysfunction of the encryption chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fast Encryption System Based on Four-Base Binary Modulo Operation
  • A Fast Encryption System Based on Four-Base Binary Modulo Operation
  • A Fast Encryption System Based on Four-Base Binary Modulo Operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The system as a whole is composed of a protocol layer and a calculation layer. The protocol layer is a functional module, which is responsible for realizing the signature verification and encryption and decryption functions of the entire system; the calculation layer mainly performs curve domain arithmetic and prime number domain modulo calculation. All operations of the protocol layer are completed by the operation layer, and then the data is sent back to the protocol layer. Among them, modular inverse, modular multiplication and modular addition and subtraction constitute point addition and doubling operations, and point addition and doubling operations constitute scalar multiplication operations.

[0050] The hash operation required by the protocol layer is completed by the SM3 module, and the random number generator is responsible for generating random numbers to form a private key and generating operands required in the operation process. In addition, the buffer mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fast encryption system based on quadratic binary bottom layer modulo operation. , wherein: the operation layer includes a scalar multiplication module, and the scalar multiplication module is connected with an SM3 module for performing hash operations and a random number generator for generating random numbers, and the scalar multiplication module includes a point addition module and a multiplication point module, It is used to realize modular inversion, modular multiplication, and modular addition and subtraction operations; this scheme realizes a fast encryption system based on four-base binary bottom-level modular operation by improving the underlying modular operation of the elliptic curve encryption system. The base binary fast modulo operation is introduced into the elliptic curve encryption system, thereby improving the operation efficiency of the encryption system.

Description

technical field [0001] The invention relates to the technical field of encrypted communication in integrated circuits, in particular to a fast encryption system for encrypting and decrypting data inside a chip, signing and verifying data. Background technique [0002] In the past ten years, with the rapid development of information technology, the popularity of computer networks and mobile terminals has greatly increased, and the amount of information transmission has increased suddenly. It contains a large amount of important military, political, economic, and personal information. If it is eavesdropped, tampered, intercepted, or destroyed during the dissemination and sharing of information, it will cause immeasurable losses. Therefore, the issue of information security has become an increasingly important subject, and people have put forward higher requirements for information security. Cryptography technology is an important part of solving information security problems,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3252H04L63/0428H04L63/12H04L63/126H04L2209/125
Inventor 胡恩熊晓明黄宏敏张明森
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products