Hardware implementation method and system for elliptic curve digital signature and signature verification

An elliptic curve and digital signature technology, applied in the field of information security, can solve the problems of high computational complexity, insufficient hardware performance, and difficult acceleration, and achieve the effects of low computational complexity, low hardware resource consumption, and easy hardware implementation.

Pending Publication Date: 2021-12-10
南京宁麒智能计算芯片研究院有限公司
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems of high computational complexity, insufficient hardware performance and difficult acceleration of the elliptic curve digital signature algorithm existing in the prior art, the present invention provides a hardware implementation me

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware implementation method and system for elliptic curve digital signature and signature verification
  • Hardware implementation method and system for elliptic curve digital signature and signature verification
  • Hardware implementation method and system for elliptic curve digital signature and signature verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0104] This embodiment discloses a hardware implementation method of high-performance elliptic curve digital signature and signature extension. First, the calculation path of the elliptic curve digital signature algorithm is analyzed, and the entire algorithm is divided into four levels. The highest level (that is, the fourth level) is the elliptic curve. Digital signature and signature verification calculation scheduling, the third level is scalar multiplication calculation, the second level is point addition and doubling point operation, the first level is various modular operations (modular multiplication, modular inverse, modular addition, modular subtraction, modular shift bits). In the implementation method of this embodiment, in order to reduce additional hardware overhead, the modulus for generating signature verification parameters in the signature and signature verification steps is replaced by a modulo addition calculation with an addend of 0, which avoids additional...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware implementation method and system for elliptic curve digital signature and signature verification, and belongs to the technical field of information security. In the prior art, the problems of high calculation complexity, insufficient hardware performance and high acceleration difficulty of an elliptic curve digital signature algorithm exist. In order to solve said problems, the hardware implementation method comprises the following steps: integrating point doubling, point addition, modular multiplication operation, modular addition operation, modular subtraction operation, modular inverse operation, modular shift operation and other bottom layer operations; building a new computing array structure, optimizing a scheduling method, and integrating and sharing computing resources. The calling times and the hardware resource consumption in the calculation process are reduced, the hardware performance and the scheduling sequence are improved, the system calculation time is shortened, the calculation efficiency is improved, the hardware resource use is reduced, and better performance is obtained.

Description

technical field [0001] The present invention relates to the technical field of information security, more specifically, to a hardware implementation method and system for elliptic curve digital signature and signature verification. Background technique [0002] Elliptic Curve Cryptography (ECC, Elliptic Curve Cryptography) is an algorithm for establishing public key encryption, based on elliptic curve mathematics, first proposed independently by Neal Koblitz and Victor Miller in 1985. Compared with the RSA encryption algorithm, elliptic curve encryption has higher security and less calculation, and has gradually become a hot spot in cryptography research, and has been used as a standardized document by many international standardization organizations. At present, the ECC algorithm has important applications in digital signature, mobile device communication, security semiconductor, blockchain and other fields. [0003] Elliptic Curve Digital Signature Algorithm (ECDSA, Ellip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3252
Inventor 李丽龙威傅玉祥何书专陈健
Owner 南京宁麒智能计算芯片研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products