From 891730d13b324fad916572a82f0bd610c5de9aad Mon Sep 17 00:00:00 2001 From: Rob Austein Date: Sun, 13 Sep 2020 23:06:24 +0000 Subject: Rename for conversion --- .../GitRepositories%2Fuser%2Fshatov%2Fecdsa384 | 104 --------------------- 1 file changed, 104 deletions(-) delete mode 100644 raw-wiki-dump/GitRepositories%2Fuser%2Fshatov%2Fecdsa384 (limited to 'raw-wiki-dump/GitRepositories%2Fuser%2Fshatov%2Fecdsa384') diff --git a/raw-wiki-dump/GitRepositories%2Fuser%2Fshatov%2Fecdsa384 b/raw-wiki-dump/GitRepositories%2Fuser%2Fshatov%2Fecdsa384 deleted file mode 100644 index 00ff1a0..0000000 --- a/raw-wiki-dump/GitRepositories%2Fuser%2Fshatov%2Fecdsa384 +++ /dev/null @@ -1,104 +0,0 @@ -{{{ -#!htmlcomment - -This page is maintained automatically by a script. Don't modify this page by hand, -your changes will just be overwritten the next time the script runs. Talk to your -Friendly Neighborhood Repository Maintainer if you need to change something here. - -}}} - -{{{ -#!html -

ecdsa384

- -

Core Description

- -

This core implements the scalar base point multiplier for ECDSA curve P-384. It can be used during generation of public keys, the core can also be used as part of the signing operation.

- -

API Specification

- -

The core interface is similar to other Cryptech cores. FMC memory map looks like the following:

- -

0x0000 | NAME0 -0x0004 | NAME1 -0x0008 | VERSION

- -

0x0020 | CONTROL -0x0024 | STATUS

- -

0x0100 | K0 -0x0104 | K1 -... -0x012C | K11

- -

0x0140 | X0 -0x0144 | X1 -... -0x017C | X11

- -

0x0180 | Y0 -0x0184 | Y1 -... -0x01AC | Y11

- -

The core has the following registers:

- - - -

Implementation Details

- -

The top-level core module contains block memory buffers for input and output operands and the base point multiplier, that reads from the input buffer and writes to the output buffers.

- -

The base point multiplier itself consists of the following:

- - - -

The "worker" unit can execute five basic operations:

- - - -

There are two primary microprograms, that the worker runs: curve point doubling and addition of curve point to the base point. Those microprograms use projective Jacobian coordinates, so one more microprogram is used to convert the product into affine coordinates with the help of modular inversion unit.

- -

Note, that the core is supplemented by a reference model written in C, that has extensive comments describing tricky corners of the underlying math.

- -

Vendor-specific Primitives

- -

Cryptech Alpha platform is based on Xilinx Artix-7 200T FPGA, so this core takes advantage of Xilinx-specific DSP slices to carry out math-intensive operations. All vendor-specific math primitives are placed under /rtl/lowlevel/artix7, the core also offers generic replacements under /rtl/lowlevel/generic, they can be used for simulation with 3rd party tools, that are not aware of Xilinx-specific stuff. Selection of vendor/generic primitives is done in ecdsa_lowlevel_settings.v, when porting to other architectures, only those four low-level modules need to be ported.

-}}} - -[[RepositoryIndex(format=table,glob=user/shatov/ecdsa384)]] - -|| Clone `https://git.cryptech.is/user/shatov/ecdsa384.git` || -- cgit v1.2.3