Font Size: a A A

IP Design And Implementation Of SM9 Algorithm Prime Domain For IoT Security Chi

Posted on:2024-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:H YuFull Text:PDF
GTID:2568307106983179Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In today’s highly developed Io T technology,people are more concerned about their own safety issues.Cryptography,a key safeguard for contemporary Io T information security,has undergone multiple iterations and upgrades in its technological development.Among them,public key cryptosystems as an extremely important cryptographic mechanism,mainly solving problems that are difficult to implement on public channels in traditional cryptosystems,such as disseminating keys,electronic signatures,and verifying identity.Nevertheless,conventional public key cryptosystems have trouble with key management,such as complex certificate exchanges.Cryptographic algorithms for identification have been developed to address these problems.At present,after continuous improvement,the identity-based cryptography has become one of China’s cryptographic standards,namely,the SM9 identity-based cryptography algorithm.This algorithm is mainly used for simple key management and powerful encryption capability,and is a commercial cryptographic algorithm particularly suitable for use in the field of Io T security.Due to the high computational complexity and sophistication of the SM9 identity-based cryptography algorithm,and the limited computing power of the Io T security chip.For the realization of SM9 algorithm,an algorithm IP design based on So C design is presented.Verification of the simulation was performed on the Xilinx Virtex-7 platform,and the test results showed that the proposed scheme has an improvement in performance of up to 7.7x over the pure software implementation scheme.Specific studies and contributions include:1.Through in-depth study and analysis of the SM9 identity-based cryptography algorithm,we focus on the design of its main protocol algorithm flows.Meanwhile,to resolve the conflict between the computational efficiency and resource overheads of the current SM9identity-based encryption algorithms,an IP implementation scheme of the SM9 algorithm based on the So C design approach is proposed.By dividing the algorithm into corresponding layers and software and hardware,the time-consuming underlying prime field modular computation is implemented by FPGA,and the top-level protocol algorithm is implemented by the domestic Loong Arch architecture.2.For the most time-consuming modular multiplication and inverse operations in the underlying prime field modular operations,optimization is performed at the algorithm level and the hardware level,respectively.At the algorithmic level,a Montgomery modular multiplication based prime field tandem parallel mixed variable step size deconstruction algorithm is designed for modular multiplication operations,and an 8-Radix prime domain fast modular inversion algorithm based on binary extended Euclidean algorithm is proposed for modular inversion operations.At the hardware level,the main computing components,namely,256 bit multipliers and 128 bit adder-subtractors,are optimized by pipeline splitting.By optimizing the design of these two levels,the overall computing efficiency of the entire underlying modular computing has been significantly improved,greatly enhancing the computing performance of the SM9 algorithm IP.3.This designed SM9 algorithm IP was simulated and verified.The hardware part was mainly simulated and tested on the Model Sim simulation tool,while the software part was mainly programmed and tested on VS2016.The test results indicate that the behavior of the algorithm in IP is correct and has a performance improvement of up to 7.7x compared to the pure software implementation on Loong Arch architecture.
Keywords/Search Tags:Information safety, Algorithm IP, SM9 identity-based cryptography algorithm, Modular inversion algorithm
PDF Full Text Request
Related items