Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-domain elliptic curve dot product hardware accelerator

A hardware accelerator and elliptic curve technology, applied in electrical components, public keys for secure communication, digital transmission systems, etc., can solve problems such as slow computing speed, and achieve the effect of improving efficiency and high flexibility

Pending Publication Date: 2020-10-27
YICHIP MICROELECTRONICS (HANGZHOU) CO LTD
View PDF14 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to save space, the point multiplication, point addition and point multiplication operations of elliptic curve cryptography are implemented by calling the underlying modular operation accelerator through software, resulting in slow operation speed of the ECC cryptosystem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-domain elliptic curve dot product hardware accelerator
  • Double-domain elliptic curve dot product hardware accelerator
  • Double-domain elliptic curve dot product hardware accelerator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The implementation steps of the present invention will be described in detail below in conjunction with the accompanying drawings. The structure diagram of the elliptic curve point multiplication accelerator is attached Figures 1 to 3 As shown, the modular operation includes three basic dual-domain modular operations: modular reduction, modular multiplication, and modular inversion. The prime number field point operation layer includes doubling and point addition, which are completed by calling different modular operations through the state machine. Prime number field point multiplication It is completed by calling the state machine of doubling and dot adding, and the dot multiplication of binary domain is completed by calling different modulo operations through the state machine.

[0013] Among them, all point operations and modulo operations are implemented by hardware to improve the speed of ECC operations.

[0014] In one example, the Montgomery modular multiplica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A double-domain elliptic curve dot product hardware accelerator is divided into a modular operation layer and a point operation layer, wherein the modular operation layer comprises a prime number domain and binary domain modular modular reduction module, a multiplication module and a modular inversion module, and the point operation layer comprises a prime number field NAF dot product operation module and a multiple point and point addition and binary system field dot product module. The hardware accelerator is mounted on an equipment bus as slave equipment and is connected to a processor, andthe processor realizes different acceleration operation modes by configuring a function register in the hardware accelerator.

Description

[technical field] [0001] The invention relates to a method for realizing a very large scale integrated circuit (VLSI) of elliptic curve cipher point multiplication in a security chip. [Background technique] [0002] Compared with symmetric cryptosystems, public-key cryptosystems are widely used in high-security application scenarios such as digital signatures, authentication, and key distribution because of their higher security. In the field of security chips, the widely used public-key cryptosystem is the RSA encryption algorithm, which realizes large prime number modular multiplication, modular exponentiation and modular inverse operations by hardware circuits. The implementation scheme of the security chip in the prior art generally multiplexes the underlying large prime number analog operation and the RSA circuit of the prime field elliptic curve cryptography (ECC) to save the circuit area. [0003] The defect of the existing scheme is that in order to reuse a set of c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
CPCH04L9/3066H04L9/302H04L2209/12H04L2209/122
Inventor 范云海
Owner YICHIP MICROELECTRONICS (HANGZHOU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products