Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quick encryption system based on base-4 binary system underlying modular operation

An encryption system, modulo operation technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as large computing time and computing resources, serious and limited elliptic curve encryption algorithm application scenarios, etc., to save The effect of shortening operation time and operation cycle

Active Publication Date: 2019-11-22
GUANGDONG UNIV OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the common elliptic curve encryption algorithm requires multiple operation modules (modular addition and subtraction, modular inversion, modular multiplication, point addition, point doubling, scalar multiplication, and protocol layer), and its computational complexity is relatively high. Processing, the ordinary elliptic curve encryption system will consume huge computing time and computing resources, resulting in particularly serious delays in data source encryption and decryption and signature verification, which greatly limits the application scenarios of elliptic curve encryption algorithms, and even endangers the encryption system. Timing environment, resulting in a series of design problems such as internal dysfunction of the encryption chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quick encryption system based on base-4 binary system underlying modular operation
  • Quick encryption system based on base-4 binary system underlying modular operation
  • Quick encryption system based on base-4 binary system underlying modular operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The system as a whole is composed of a protocol layer and a calculation layer. The protocol layer is a functional module, which is responsible for realizing the signature verification and encryption and decryption functions of the entire system; the calculation layer mainly performs curve domain arithmetic and prime number domain modulo calculation. All operations of the protocol layer are completed by the operation layer, and then the data is sent back to the protocol layer. Among them, modular inverse, modular multiplication and modular addition and subtraction constitute point addition and doubling operations, and point addition and doubling operations constitute scalar multiplication operations.

[0050] The hash operation required by the protocol layer is completed by the SM3 module, and the random number generator is responsible for generating random numbers to form a private key and generating operands required in the operation process. In addition, the buffer mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quick encryption system based on base-4 binary system underlying modular operation. The system comprises a protocol layer for realizing signature verification and encryptionand decryption functions of the system, an operation layer used for realizing curve domain arithmetic and prime number domain modular operation; wherein the operation layer comprises a scalar multiplication module, the scalar multiplication module is connected with an SM3 module used for carrying out hash operation and a random number generator used for generating random numbers, and the scalar multiplication module comprises a point addition module and a point multiplication module and is used for realizing modular inversion, modular multiplication and modular addition and subtraction operation; according to the scheme, the bottom-layer modular operation of the elliptic curve encryption system is improved, so that the quick encryption system based on the four-base binary bottom-layer modular operation is realized, and the scheme is mainly characterized in that the four-base binary quick modular operation is introduced into the elliptic curve encryption system, so that the operation efficiency of the encryption system is improved.

Description

technical field [0001] The invention relates to the technical field of encrypted communication in integrated circuits, in particular to a fast encryption system for encrypting and decrypting data inside a chip, signing and verifying data. Background technique [0002] In the past ten years, with the rapid development of information technology, the popularity of computer networks and mobile terminals has greatly increased, and the amount of information transmission has increased suddenly. It contains a large amount of important military, political, economic, and personal information. If it is eavesdropped, tampered, intercepted, or destroyed during the dissemination and sharing of information, it will cause immeasurable losses. Therefore, the issue of information security has become an increasingly important subject, and people have put forward higher requirements for information security. Cryptography technology is an important part of solving information security problems,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3252H04L63/0428H04L63/12H04L63/126H04L2209/125
Inventor 胡恩熊晓明黄宏敏张明森
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products