Font Size: a A A

The Research And Implementation Of ECC Encryption Algorithm

Posted on:2021-03-04Degree:MasterType:Thesis
Country:ChinaCandidate:E HuFull Text:PDF
GTID:2428330611967545Subject:Control engineering
Abstract/Summary:PDF Full Text Request
As an important indicator to measure the development level of human society,the level of information technology has become an important factor in the progress of science and technology in the world.The phenomenon of everything interconnection based on information technology has also been widespread in our lives.As an important means of ensuring information security in human society today,the development and technological innovation of cryptography are changing with each passing day.The establishment of public-key cryptosystem has opened a wider cryptology world for human beings.People use public-key cryptosystem to solve the problem that symmetric cryptosystem is difficult to realize on public channel,such as digital signature,identity authentication,key distribution and so on.The emergence of Elliptic Curve Cryptography(ECC)pushes the public-key cryptosystem to another climax.Although ECC is one of the public-key cryptosystems,it has the characteristics of higher security,smaller key length and lower bandwidth requirement.Therefore,ECC has been highly praised by cryptologists as soon as it appears.ECC has become an international standard after continuous improvement at present.In order to consolidate national security,more and more countrie s have formulated their own elliptic curve cryptography standard according to international standard.The elliptic curve cryptography will also be an important direction for the development of the next generation cryptography technology.Therefore,a hardware cryptosystem has been designed,which is based on the international elliptic curve cryptosystem standard.The system can realize the functions of digital signature v erification,public-key encryption and decryption,public-key generation and so on.The system is divided into three functional layers: the bottom modular operation layer,the curve domain arithmetic layer and the cryptographic protocol layer,and the hardware architecture of each functional layer is realized by modularization.In addition,after analyzed the working principle of ECC by hierarchical division,the bottom module operation has been optimized by task amount of data processing.The 4-Radix algorithm has been introduced into the bottom module operation and realized by the hardware design in this paper.By this way,the shift efficiency of module inversion and module multiplication has been improved,which has solved the problem of low performance in the traditional bottom module.Finally,through the method of hardware and software co debugging,the whole cryptosystem and each functional block are simulated and tested.The test results show that each function of ECC is normal the cryptosystem can complete three functions of signature verification,public-key encryption and decryption,and public-key generation according to ECC Protocol as scheduled.In addition,the RC logic integrated tool has been used in this paper.The analysis report shows that the maximum working frequency of the cryptosystem designed in this paper can reach 200 MHz under the SMIC 0.11 ?m process library,and the signature rate is 132 times per second,the signature verification rate is 63 times per second,the public-key encryption rate is 66 times per second,the public-key decryption rate is 129 times per second and the public-key generation rate is 130 times per second.
Keywords/Search Tags:Information safety, Cryptosystem, Elliptic curve cryptosystem, Digital signature, Public-key encryption
PDF Full Text Request
Related items