Modified RSA Public Key Algorithm

被引:0
|
作者
Aswathy, B. G. [1 ]
Resmi, R. [1 ]
机构
[1] LBS Inst Technol Women, Dept Elect & Commun, Thiruvananthapuram, Kerala, India
关键词
FPGA (Field Programmable Gate Array); Montgomery multiplication; modular exponentiation; Xilinx ISE (Integrated Software Environment);
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern cryptography is heavily based on mathematical theory and computer science practice. cryptographic algorithms are designed around computational hardness assumptions. Among the various techniques adopted in cryptographic technology the RSA (Rivest, Shamir and Adleman) is the most widely used public key cryptosystem. The basic operation for this algorithm is modular exponentiation. Modular multiplication is the core computation of all modular exponentiation algorithms, Montgomery's method is considered as the most efficient algorithm for performing the modular multiplication operation. This paper presents two architectures for FPGA implementation of modular exponentiation algorithm based on Montgomery technique-one with parallel technique and another with maximum sequential operation. Finally these architectures are analyzed with respect to area, speed, and power using Xilinx ISE.
引用
收藏
页码:252 / 255
页数:4
相关论文
共 50 条
  • [1] PROOF CHECKING THE RSA PUBLIC KEY ENCRYPTION ALGORITHM
    BOYER, RS
    MOORE, JS
    [J]. AMERICAN MATHEMATICAL MONTHLY, 1984, 91 (03): : 181 - 189
  • [2] FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEM
    QUISQUATER, JJ
    COUVREUR, C
    [J]. ELECTRONICS LETTERS, 1982, 18 (21) : 905 - 907
  • [3] Key Distribution and Changing Key Cryptosystem Based on Phase Retrieval Algorithm and RSA Public-Key Algorithm
    Zhao, Tieyu
    Ran, Qiwen
    Yuan, Lin
    Chi, Yingying
    Ma, Jing
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [4] RSA public key validation
    Silverman, RD
    [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 369 - 378
  • [5] Modified Trial Division Algorithm Using KNJ-Factorization Method To Factorize RSA Public Key Encryption
    Lal, Nidhi
    Singh, Anurag Prakash
    Kumar, Shishupal
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 992 - 995
  • [6] The RSA public key cryptosystem
    Wardlaw, WP
    [J]. CODING THEORY AND CRYPTOGRAPHY: FROM ENIGMA AND GEHEIMSCHREIBER TO QUANTUM THEORY, 2000, : 101 - 123
  • [7] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    [J]. SYMMETRY-BASEL, 2024, 16 (03):
  • [8] Fast parallel exponentiation algorithm for RSA public-key cryptosystem
    Wu, Chia-Long
    Lou, Der-Chyuan
    Lai, Jui-Chang
    Chang, Te-Jen
    [J]. INFORMATICA, 2006, 17 (03) : 445 - 462
  • [9] Magnifying the Key Stability of RSA Algorithm in Data Security for Public Cloud
    Kamal, M.
    Ravi, G.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 805 - 812
  • [10] Enhanced RSA Algorithm using Fake Modulus and Fake Public Key Exponent
    Raghunandhan, K. R.
    Shetty, Surendra
    Aithal, Ganesh
    Rakshith, N.
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 755 - 759