An efficient montgomery exponentiation algorithm for cryptographic applications

被引:0
|
作者
Wu, CL [1 ]
Lou, DC
Chang, TJ
机构
[1] Chinese Air Force Inst Technol, Dept Aviat & Commun Elect, Kaohsiung 820, Taiwan
[2] Natl Def Univ, Chung Cheng Inst Technol, Dept Elect Engn, Taoyuan 33509, Taiwan
关键词
montgomery reduction algorithm; common-multiplicand-multiplication; signed-digit recoding; modular exponentiation; public-key cryptosystems;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Efficient computation of the modular exponentiations is very important and useful for public-key cryptosystems. In this paper, an efficient parallel binary exponentiation algorithm is proposed which based on the Montgomery multiplication algorithm, the signed-digit-folding (SDF) and conunon-multiplicand-multiplicand (CMM) techniques. By using the CMM technique of computing the common part from two modular multiplications, the same common part in two modular multiplications can be computed once rather twice, we can thus improve the efficiency of the binary exponentiation algorithm by decreasing the number of modular multiplications. By dividing the bit pattern of the minimal-signed-digit recoding exponent into three equal length parts and using the technique of recording the common parts in the folded substrings, the proposed SDF-CMM algorithm can improve the efficiency of the binary algorithm, thus can further decrease the computational complexity of modular exponentiation. Furthermore, by using the proposed parallel SDF-CMM Montgomery binary exponentiation algorithm, on average the total number of single-precision multiplications can be reduced by about 61.3% and 74.1% as compared with ChangKuo-Lin's CMM modular exponentiation algorithm and Ha-Moon's CMM Montgomery modular exponentiation algorithm, respectively.
引用
收藏
页码:449 / 468
页数:20
相关论文
共 50 条
  • [1] An efficient Montgomery exponentiation algorithm for public-key cryptosystems
    Wu, Chia-Long
    Lou, Der-Chyuan
    Chang, Te-Jen
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
  • [2] An efficient Montgomery multiplication algorithm and RSA cryptographic processor
    Garg, Richa
    Vig, Renu
    [J]. ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL II, PROCEEDINGS, 2007, : 188 - 195
  • [3] Systolic modular exponentiation via montgomery algorithm
    Tiountchik, AA
    [J]. ELECTRONICS LETTERS, 1998, 34 (09) : 874 - 875
  • [4] An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques
    Lou, Der-Chyuan
    Lai, Jui-Chang
    Wu, Chia-Long
    Chang, Te-Jen
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) : 31 - 44
  • [5] An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
    Wu, Chia-Long
    [J]. INFORMATION SCIENCES, 2009, 179 (04) : 410 - 421
  • [6] A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation"
    Sun, Da-Zhi
    Huai, Jin-Peng
    Cao, Zhen-Fu
    [J]. INFORMATION SCIENCES, 2013, 223 : 331 - 334
  • [7] EFFICIENT ARCHITECTURES FOR MODULAR EXPONENTIATION USING MONTGOMERY POWERING LADDER
    He, Yiruo
    Wu, Huapeng
    [J]. 2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 1202 - 1205
  • [8] Elliptic curves with the Montgomery-form and their cryptographic applications
    Okeya, K
    Kurumatani, H
    Sakurai, K
    [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 238 - 257
  • [9] Montgomery Modular exponentiation on FPGA
    Nadjia, Anane
    Mohamed, Anane
    Mohamed, Issad
    [J]. 2012 24TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2012,
  • [10] A common-multiplicand method to the Montgomery algorithm for speeding up exponentiation
    Ha, JC
    Moon, SJ
    [J]. INFORMATION PROCESSING LETTERS, 1998, 66 (02) : 105 - 107