Font Size: a A A

The Design Of ECC Coprocessor On Power Attacks Resistant

Posted on:2017-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:L P ZhaoFull Text:PDF
GTID:2308330509957510Subject:Integrated circuit engineering
Abstract/Summary:PDF Full Text Request
Information security is a matter concerning about national sovereignty security, social stability, which inherits and carrys forward the traditional culture. The password technology is not only the core of information security, but also an essential technology to ensure information integrity, confidentiality and security. The Elliptic Curve Cryptosystem(ECC) is a kind of public key cryptosystem which is based on the elliptic curve discrete logarithm problem. Comparing with the current mainstream RSA public key cryptographic system,ECC is considered as the future place of RSA public key cryptosystem because of its high security, small computation quantity, high processing speed, small storage space and low bandwidth requirements. However, with the application of ECC in the field of information security becoming more mature, especially power analysis attack technique, which obtains secret information on the chip in private, mainly using chip data during cryptographic chip’s processing of the instantaneous power consumption and the involving operations performed.Based on the above background. Firstly, the mathematical theory of elliptic curve cryptosystem was discussed in this paper, and on this basis, this paper focuses on how to implement the scalar multiplication module of ECC, which is the core computing module of ECC, in the form of hardware. Then ECC was divided into binary field operation layer and elliptic curve operation layer, and the two layers were designed respectively design binary field arithmetic layer mode, modular multiplication, modular square and die inverse module and elliptic curve operation layer of point addition and doubling and module, and the use of projective coordinates Montgomery scalar multiplication algorithm achieves a scalar multiplication module, and functional verification of each module. Then, in-depth study of the power attack theory and for ECC cryptosystem security protection technology, based on the axis of the randomization of projective coordinates Montgomery scalar multiplication algorithm is optimized, on the level of algorithm proposed ECC scalar multiplication anti power consumption attack protection scheme, and according to the design of the door out of the a with power attack resistance ability of the ECC scalar multiplication module, and validate the correctness of the function. Finally, the power attack experiment is conducted, and it is proved that it has the ability of anti DPA attack.
Keywords/Search Tags:Information Security, Elliptic Curve Cryptosystem, Power Attack
PDF Full Text Request
Related items