Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware implementation system for SM2 elliptic curve public key encryption algorithm under pixel field Fp

A public-key encryption algorithm and elliptic curve technology, which is applied in the field of message encryption and decryption, hardware implementation system of SM2 elliptic curve public-key encryption algorithm, and can solve problems such as large consumption of hardware resources

Inactive Publication Date: 2017-10-24
GUANGDONG UNIV OF TECH
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the State Cryptography Administration announced the SM2 elliptic curve public key encryption algorithm as early as 2010, there are still relatively few schemes for implementing it in hardware, and the existing hardware implementation schemes consume a lot of hardware resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware implementation system for SM2 elliptic curve public key encryption algorithm under pixel field Fp
  • Hardware implementation system for SM2 elliptic curve public key encryption algorithm under pixel field Fp
  • Hardware implementation system for SM2 elliptic curve public key encryption algorithm under pixel field Fp

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0062] The present invention provides a hardware implementation system of the SM2 elliptic curve public key encryption algorithm under the prime field Fp. The SM2 elliptic curve and algorithm involved in the present invention are all defined on the prime field Fp, where p is greater than 3 Prime number. The elliptic curve equation on the prime field Fp is y 2 x 3 +ax+b, where a, b∈Fp, and (4a 3 +27b 2 ) mod p ≠ 0.

[0063] figure 1 The overall structural diagram of the hardware implementation system of the SM2 elliptic curve public key encryption algorithm under a kind of prime field Fp provided by the present invention, this system can realize the encryption and decryption to the message from the hardware, guarantee the security of the message, prevent the message Attacked during transmission, thus being intercepted or destroyed by criminals. The modules used in the system include: SM2 main control module, SM2 analysis module, encryption control module, decryption contr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware implementation system for an SM2 elliptic curve public key encryption algorithm under a pixel field Fp. The system is reasonably divided into a plurality of modules under the pixel field Fp by adopting a high-level modularization method; message encryption and ciphertext decryption can be realized by using a hardware method; multiplexing of a random number generating module, an operation control module, a bit string processing module, a key derivation module and a hash module is realized by adopting a hardware module multiplexing method and setting upper-layer multiplexing modules; multiplexing of a point multiplication operation module, an XOR operation module, a bit string conversion module and a bit string splicing module is realized by setting lower-layer multiplexing modules; therefore, provided is a hardware implementation system for an SM2 elliptic curve public key encryption algorithm under a pixel field Fp, which is lower in hardware resource consumption, lower in cost, faster in operation, simple in structure and easy to implement.

Description

technical field [0001] The invention relates to message encryption and decryption technology in the field of information security, in particular to a hardware implementation system of SM2 elliptic curve public key encryption algorithm under prime field Fp. Background technique [0002] With the development of network technology, people pay more and more attention to network security issues. Information encryption and decryption technology is widely used in the field of network security, which can ensure the security of information and prevent information from being attacked during transmission, thereby being intercepted or destroyed by criminals. [0003] SM2 is an elliptic curve public key cryptographic algorithm released by the State Cryptography Administration on December 17, 2010. Compared with traditional public key cryptosystems (such as RSA cryptosystem), elliptic curve cryptosystems use relatively short keys to The same degree of security can be achieved. Therefore...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/3033H04L9/3066H04L2209/12
Inventor 王丽雪熊晓明
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products