ECC (Error Correction Code) authentication method and system for reducing modular inversion calculation

An authentication method and a modulo inverse technology, applied in the field of security authentication, which can solve the problems of long calculation time, difficult reuse of calculation units, and large amount of calculation.

Active Publication Date: 2021-09-07
晶澄微电子(宁波)有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, the current solution requires matrix inversion, which requires a large amount of c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ECC (Error Correction Code) authentication method and system for reducing modular inversion calculation
  • ECC (Error Correction Code) authentication method and system for reducing modular inversion calculation
  • ECC (Error Correction Code) authentication method and system for reducing modular inversion calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] An embodiment of the present invention provides an ECC authentication method that reduces modular inverse calculations, such as figure 1 As shown, the method may specifically include the following steps:

[0105] Step S101, the host receives an authentication request from the slave, wherein the slave stores a public key and private key pair.

[0106] Exemplarily applied to a service access system including user terminals, routers, servers, and service systems, the user terminals can send service bearer authentication requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication, routers, The server obtains the authentication request sent by the user terminal in turn, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with access functions.

[0107] It should be noted that the execution subject of each step in this embodiment may specific...

Embodiment 2

[0118] An embodiment of the present invention provides an ECC authentication method that reduces modular inverse calculations, such as figure 1 As shown, the method may specifically include the following steps:

[0119] Step S201, the host receives an authentication request from the slave, wherein the slave stores a public key and private key pair.

[0120] It is exemplarily applied to a service access system including user terminals, routers, servers, and business systems. The user terminals can send service bearer authentication requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication. Routers, routers, The server obtains the authentication request sent by the user terminal in turn, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with access functions.

[0121] It should be noted that the execution subject of each step in this embodim...

Embodiment 3

[0133] An embodiment of the present invention provides an ECC authentication system that reduces modular inverse calculations, such as figure 2 As shown, the system can specifically include the following modules:

[0134] The receiving request module is used for the master to receive the authentication request from the slave, wherein the slave stores a public key and private key pair.

[0135] Exemplarily applied to a service access system including user terminals, routers, servers, and service systems, the user terminals can send service bearer authentication requests carrying user information such as device identifiers, address locations, etc. through wired or wireless communication, routers, The server obtains the authentication request sent by the user terminal in turn, and finally accesses the service system. Executors of the steps in this embodiment may specifically be various devices with access functions.

[0136] It should be noted that the execution subject of eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ECC authentication method and system for reducing modular inversion calculation, and the method comprises the steps: receiving an authentication request of a slave through a host, and enabling the slave to store a public key and private key pair; enabling the host to verify the legality of the access request; and after the verification is passed, enabling the host to perform identity authentication on the slave, and if the authentication is passed, allowing the slave to access the host resources. The method has the advantages that the Z coordinate value and the X or Y coordinate value of the calculation result of the ECC jacobian coordinate are used instead of the x and y coordinate values of the projective coordinate, so that only modular multiplication operation can be carried out during authentication, modular inverse operation is avoided, point multiplication operation only needs to be carried out once, complex and time-consuming modular inverse operation is avoided for the slave end, the area of the slave end is optimized, the computing time of the slave end is reduced, the cost is minimum, the time is shortest, and therefore the method is most suitable for hardware implementation.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to an ECC authentication method and system that reduces modular inverse calculation. Background technique [0002] Elliptic curve cryptography, referred to as ECC, is an asymmetric encryption algorithm based on elliptic curve mathematical theory. structure. According to this method, the trapdoor function is the solution of a discrete logarithm over a finite field. This problem is known in the art as the "discrete logarithm problem", and in the case of elliptic curves over finite fields, the "elliptic curve discrete logarithm problem", and has been shown to be more efficient than the problem on which other public-key methods are based trickier. Compared with RSA, the advantage of ECC is that a shorter key can be used to achieve equivalent or higher security than RSA. According to research, a 160-bit ECC key will provide a security level equivalent to a 1024-bit RS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30H04L29/06
CPCH04L9/0869H04L9/3066H04L63/101
Inventor 官志勇刘玉兵方虹冯学裕
Owner 晶澄微电子(宁波)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products