Font Size: a A A

The Asymmetrical Algorithm Space Reconfigurable Logic Technology Research And The SoC Design

Posted on:2007-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:W CaoFull Text:PDF
GTID:2178360185973459Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
At present the main research and the application public key (PKI) the system crypto-algorithm has two kinds: The RSA algorithm and the ECC algorithm, former based on the great divisor of integers decomposition difficult problem, latter is separated the logarithmic computation difficult problem based on the elliptic curve in. In the major part public key system carries on adds the decipher and the digital signature use is the RSA algorithm. The key length unceasing growth requests which along with RSA, the efficiency becomes a biggest bottleneck, regarding more and more requests to carry on massive security transaction situations and so on application situation like electronic commerce is in particular so. ECC applies the main merit which compares in the public key crypto-algorithm and RSA is: The quicker Canadian decipher speed, a greater band width saves, the higher memory efficiency, 160 bits ECC password system encryption intensity has been equal to 1024 bits RSA password system encryption intensity. But may foresee is RSA and ECC will certainly to coexist in quite long period of time, therefore studies one kind simultaneously to support realizes both encryption algorithm chip association processor, like this applies in the cryptographic system, may realize two algorithms to coordinate mutually, uses in turn, without doubt to enhances the information security to have the very big significance and the application prospect.The Reconfigurable theory thought is may reorganize the electric circuit interior controllable node through the change thus value the change to be possible to reorganize the electric circuit structure realization different electric circuit function to be possible to reorganize the operation, and by the controllable node establishment instruction obvious instruction class, is composed the algorithm configuration files, through the software and hardware joint operation, realizes as far as possible many kinds of algorithms with the limited electric circuit scale. This article utilizes may reorganize the theory, through RSA, the ECC algorithm in while may reorganize the analysis take the Montmoney mold as the core operation granularity in, rests on RSA and the ECC algorithm elementary operation eo company collection, the sum aggregate and altogether relations and so on collection, the establishment controllable node, designed one kind to be possible to reorganize the electric circuit based on the Montmoney algorithm double territory password (to cooperate processor), this...
Keywords/Search Tags:The Reconfigurable Logic Technology, RSA, ECC, Montgomery Multiplication Algorithm, Dual-Field Multiplier, Coprossor
PDF Full Text Request
Related items