Hardware implementation system and method for high-performance elliptic curve digital signature and signature verification

An elliptic curve and digital signature technology, applied in the field of information security, can solve the problems of long calculation time, high hardware acceleration difficulty and high complexity, and achieve the effect of easy hardware implementation, less hardware resource consumption, and less hardware resource consumption.

Pending Publication Date: 2021-12-14
南京宁麒智能计算芯片研究院有限公司
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems existing in the prior art that the ECDSA algorithm has high complexity, long calculation time and difficult hardware acceleration, the present invention provides a hardware implementation system and method for hi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware implementation system and method for high-performance elliptic curve digital signature and signature verification
  • Hardware implementation system and method for high-performance elliptic curve digital signature and signature verification
  • Hardware implementation system and method for high-performance elliptic curve digital signature and signature verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] This embodiment discloses a hardware implementation system for high-performance elliptic curve digital signature and signature verification, such as figure 1As shown, the system includes a signature verification controller, a scalar multiplication controller, a bottom operation controller and an operation module; the signature verification controller and the scalar multiplication controller perform data transmission, and the scalar multiplication controller and the bottom operation controller perform data transmission For data transmission, the signature verification controller also performs data transmission with the underlying computing controller, and the underlying computing controller performs data transmission with the computing module.

[0034] The signature verification controller is used to configure the signature and verification mode, and receives the elliptic curve digital signature and verification parameters, calls the operation module connected to the unde...

Embodiment 2

[0047] Based on the hardware system disclosed in Embodiment 1, this embodiment discloses a hardware implementation method of high-performance elliptic curve digital signature and extension. Firstly, the calculation path of Elliptic Curve Digital Signature Algorithm (ECDSA) is analyzed, and the entire algorithm is divided into four levels. , the highest level (that is, the fourth level) is elliptic curve digital signature and signature verification calculation scheduling, the third level is scalar multiplication calculation, the second level is point addition and doubling operation, and the first level is various modular operations (modular multiplication , modulo inverse, modulo addition, modulo subtraction, modulo shift). In the implementation method of this embodiment, in order to reduce additional hardware overhead, the modulus for generating signature verification parameters in the signature and signature verification steps is replaced by a modulo addition calculation with ...

Embodiment 3

[0133] Based on the hardware system disclosed in Embodiment 1, this embodiment discloses a hardware implementation method for high-performance elliptic curve digital signature verification. The difference from Embodiment 2 is that the system of this embodiment is configured as a signature verification mode, including the following steps.

[0134] Step Ⅰ: Read elliptic curve parameters and configuration.

[0135] Starting from the first clock, the data input to the input port are elliptic curve parameter a, modulus p, base point x coordinate Gx, base point y coordinate Gy, signature data to be verified r, signature data to be verified s, plaintext e , the order n of the base point, the x-coordinate Qx of the public key Q, and the y-coordinate Qy of the public key Q.

[0136] Step Ⅱ: Configure as signature verification mode, calculate c=(s′) -1 mod n, u 1 = ec mod n and u 2 =rc mod n. call scalar multiply, compute u 1 G and u 2 Q. call point add, computes (x 1 ,y 1 ) = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware implementation system and a method for high-performance elliptic curve digital signature and signature verification, and belongs to the technical field of information security. In order to solve the problems that in the prior art, an ECDSA algorithm is high in complexity, long in calculation time consumption and large in hardware acceleration difficulty, the system comprises a signature verification controller, a scalar multiplication controller, a bottom layer operation controller and an operation array for achieving various modular operations, and a novel modular multiplication array structure is provided in the operation array. The scheduling of point doubling and point adding calculation is facilitated, and the performance is high in unit area. According to the invention, point doubling, point addition, modular multiplication operation, modular addition operation, modular subtraction operation, modular inverse operation, modular shift operation and other underlying operations are integrated together, resource sharing of a calculation path is realized to the greatest extent, and high-performance implementation of modular multiplication is combined, so that a high-performance elliptic curve digital signature and signature verification algorithm is realized under relatively low hardware overhead.

Description

technical field [0001] The present invention relates to the technical field of information security, more specifically, to a hardware implementation system and method for high-performance elliptic curve digital signature and signature verification. Background technique [0002] Elliptic Curve Cryptography (ECC, Elliptic Curve Cryptography) is an algorithm for establishing public key encryption, based on elliptic curve mathematics, first proposed independently by Neal Koblitz and Victor Miller in 1985. Compared with the RSA encryption algorithm, elliptic curve encryption has higher security and less calculation, and has gradually become a hot spot in cryptography research, and has been used as a standardized document by many international standardization organizations. At present, the ECC algorithm has important applications in digital signature, mobile device communication, security semiconductor, blockchain and other fields. [0003] Elliptic Curve Digital Signature Algori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3252H04L2209/12
Inventor 李丽龙威傅玉祥何书专陈健
Owner 南京宁麒智能计算芯片研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products