Font Size: a A A

Study And Implement Of Elliptic Curve Cryptography System

Posted on:2011-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:X GaoFull Text:PDF
GTID:2178360302991281Subject:Software engineering
Abstract/Summary:PDF Full Text Request
This work is a part of security module of the SOC chip which was did in Shenzhen State Micro Technology Co.Ltd. This part is in charge of the signature and verification to make sure that the secret key work safely and algorithm run fasly. In this article, we describe the details of elliptic curve cryptography system,and focus on analyzing and researching the principles of completeing encryption,decryption,signature and verification function based on it. In this system, because that how do I solve scalar multiplication operation is the key to system implementation, So firstly, we analyze and design the scalar multiplication operation, develop the calculation process of this algorithm, design a mechanism of mutual transformation between ordinary number and Montgomery number and use a means of coordinate conversion to accelerate calculation; secondly, in order to effectively fulfill Montgomery modular multiplication operation, additionally, multiplication operation takes a lot of time and system need to complete several of its operations,so focus on design and implementation of Montgomery Modular Multiplier; then, propose the idea of hardware and software co-operation, using C language programming of the system as a way to achieve it; finally, use two debugging and build environments based on between Microsoft Visual C++ tool on PC and ARM Developer Suite V1.2 tool on FPGA to simulate and test this system. Simulation results show that the the system functions are achieved; the system implementation is good or bad factors which is to solve calculation time in bottom,just as modular calculation time. scalar multiplication operation established in this article and design of Montgomery Modular Multiplier will greatly increase the speed of the system, to achieve the expected goal.
Keywords/Search Tags:Elliptic Curve Cryptography, scalar multiplication, Montgomery modular multiplication algorithm, software and hardware implementation
PDF Full Text Request
Related items