期刊文献+

GF(2^(192))域上ECC加密的FPGA实现 被引量:1

FPGA realization of ECC encryption algorithm in GF(2^(192))
原文传递
导出
摘要 在Ⅱ类最优正规基上,提出了一种改进的基域乘法实现算法,并给出了该算法的FPGA工程实现方法,在ALTERA公司的CycloneⅡ系列FPGA器件上实现了GF(2192)域上ECC加密和AES加密的混合加密系统,完成了算法仿真、综合及实验.最后以加密卡的方式在PC机上测试,结果表明,仿真时ECC算法每s执行10000~13000次,烧到片上运行ECC算法每s执行9000~10500次,实际主频率为128 MHz. An improved algorithm based on the optimal normal basis(ONB) of typeⅡ is proposed.A realization method for this algorithm on FPGA(field programmable gate array) was also proposed.On the Cyclone II chip made by ALTERA company,the hybrid encryption of AES and ECC in GF(2192) was implemented.The experiment,carrying out the simulation and synthesis on the FPGA chip and personal computer(PC) with a PCI-66/64 bit FPGA encryption card,shows it can work at 128 MHz with computing 10 000-13 000 times per second with simulating and 9 000-10 500 times per second on the circuit board.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第10期9-12,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家重点基础研究发展计划资助项目(2007CB311203) 国家自然科学基金资助项目(60821001 U0835001 60803157)
关键词 混合加密 随圆曲线 密码体制 现场可编程门阵列 最优正规基 点乘 hybrid encryption elliptic curre crypto(ECC) field programmable gate array(FPGA) optimal normal basis(ONB) point multiplication
  • 相关文献

参考文献11

  • 1IEEE P1363. Standard for public- key cryptography: working draft[EB/OL]. 2000-08-01. http://www. secg. org.
  • 2龙涛,孙伶俐,崔永泉,洪帆.组合公钥密码的网格身份认证机制[J].华中科技大学学报(自然科学版),2008,36(11):40-43. 被引量:2
  • 3沈昌祥.关于加强信息安全保障体系的思考[J].中国计算机用户,2002(45):37-37. 被引量:9
  • 4张丽娜,陈建华,黄尹,胡进.椭圆曲线密码SOC的研究与设计[J].华中科技大学学报(自然科学版),2008,36(11):52-55. 被引量:2
  • 5Sunar B, Koc C K. An efficient optimal normal basis type Ⅱ multiplier[J]. IEEE Transactions on Computers, 2001, 50(1): 83-87.
  • 6Menezes A J. Applications of finite fields[M]. Boston: Kluwer Academic Publishers, 1993.
  • 7Omura J, Massey J. Computational method and apparatus for finite field arithmetic, US Patent, No. 4587627. 1983-06-08.
  • 8Dl R L, Iederreiter H N. Introduction to finite fields and their applications[M]. England: Cambridge University Press, 1994.
  • 9Bbleyd, Paar C. Optimal extension fields for fast arithmetic in public[J]. Key Algorithms Advances in Cryptography, 1998, 270(1 462): 472-485.
  • 10Hasan M A, Wang M Z, Bhargava V K. A modified Massey-Omura parallel multiplier for a class of finite fields[J]. IEEE Transactions on Computers, 1993, 42(10): 1 278-1 280.

二级参考文献14

  • 1Ian Foster.Globus Toolkit Version 4: Software for Service-Oriented Systems[J].Journal of Computer Science & Technology,2006,21(4):513-520. 被引量:44
  • 2YAN Fei,ZHANG Huanguo,SUN Qi,SHEN Zhidong,ZHANG Liqiang,QIANG Weizhong.An Improved Grid Security Infrastructure by Trusted Computing[J].Wuhan University Journal of Natural Sciences,2006,11(6):1805-1808. 被引量:3
  • 3Foster I, Kesselman C. The grid: blueprint for a new computing infrastructure [M]. San Fransiseo: Morgan Kaufmann, 1999.
  • 4Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[C]// ACM Conference on Computers and Security, 1998. San Fran- cisco: ACM Press, 1998: 83-92.
  • 5Gutmann P. PKI: it's not dead, just resting[J]. IEEE Computer, 2002, 35(8): 41-49.
  • 6Zhu L, Jaganathan K, Hartman S. The kerberos version 5 generic security service application program interface (GSS-API) mechanism., version 2[S]. RFC 4121, 2005. http://www. ietf. org/rfc/rfc4121. txt.
  • 7Housley R. Internet X. 509 public key infrastructure certificate and CRL profile[S]. RFC 2459, 2000. http ://www. ietf. org/rfc/rfc2459. txt.
  • 8Cafaro M, Lezzi D, Fiore S, et al. The GSI plug-in for gSOAP., building cross-grid interoperable secure grid services[J]. Lecture Notes in Computer Science, 2008, 4 967: 894-901.
  • 9Garrett P.密码学导引[M].吴世忠,宋晓龙,等译.北京:机械工业出版社,2006.
  • 10Hankerson D, Menezes A, Vanstone S. Guide to el- liptic curve cryptography[M]. Germany: Springer- Verlag, 2004.

共引文献10

同被引文献4

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部