A new fast modular multiplication method and its application to modular exponentiation-based cryptography

被引:0
|
作者
Hayashi, A [1 ]
机构
[1] Kanazawa Inst Technol, Nonoichi, Ishikawa 9218501, Japan
关键词
multiplication remainder computation; exponentiation computation; public key cryptography; RSA cryptography; El Gamar cryptography;
D O I
10.1002/1520-6440(200012)83:12<88::AID-ECJC10>3.3.CO;2-X
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to apply exponentiation-based cryptography, such as RSA cryptography and El Gamal cryptography, to a wide range of practical problems, it is desired to devise faster ciphering and deciphering processes. This paper proposes a new algorithm for improving the speed of the exponentiation-based computation. The proposed method is based on the idea in the exponentiation computation that the remainder in square/multiplication with modulus n is constructed from the remainders with moduli different from it. More precisely, the method is based on the following two ideas. (1) The remainder in regard to n can be constructed from the remainder with modulus n + 1 and the remainder with modulus n + 2. (2) It often happens that n + 1 and n + 2 can easily be factorized, even if n is a prime number or difficult to be factorized into prime factors. Then, the Chinese remainder theorem can be applied to the remainder calculation with those numbers as the moduli. The bit computational complexity of the proposed method is estimated, and it is shown, assuming the parallel computation, that the computational complexity is less than in the conventional method. Especially when n + 1 and n + 2 are factorized almost uniformly into K factors, the computational complexity asymptotically follows 1/K. The proposed method will be useful not only in the cryptography requiring the exponentiation computation, but also in improving the speed of the signal processing that requires similar computations. (C) 2000 Scripta Technica.
引用
收藏
页码:88 / 93
页数:6
相关论文
共 50 条
  • [21] Fast algorithm for modular exponentiation based on fast fourier transform
    Fuguo D.
    Yuxin T.
    Lin D.
    Journal of Convergence Information Technology, 2011, 6 (06) : 500 - 506
  • [22] Research on algorithm in fast modular exponentiation based on FPGA
    Zhao, Lianqing
    Li, Shu
    Chen, Yuanxun
    Liu, Dongjun
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 499 - 502
  • [23] Research In Fast Modular Exponentiation Algorithm Based On Fpga
    Li, Shu
    Tian, Jianwei
    Zhu, Hongyu
    Tian, Zheng
    Qiao, Hong
    Li, Xi
    Liu, Jie
    2019 11TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2019), 2019, : 79 - 82
  • [24] Fast Implementation for Modular Inversion and Scalar Multiplication in the Elliptic Curve Cryptography
    Ma, Shiwei
    Hao, Yuanling
    Pan, Zhongqiao
    Chen, Hui
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 488 - 492
  • [25] A Fast Parallel Modular Exponentiation Algorithm
    Fathy, Khaled A.
    Bahig, Hazem M.
    Ragab, A. A.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 903 - 911
  • [26] A Fast Parallel Modular Exponentiation Algorithm
    Khaled A. Fathy
    Hazem M. Bahig
    A. A. Ragab
    Arabian Journal for Science and Engineering, 2018, 43 : 903 - 911
  • [27] CRT RSA Decryption: Modular Exponentiation based solely on Montgomery Multiplication
    Carlos Neto, Joao
    Tenca, Alexandre Ferreira
    Ruggiero, Wilson Vicente
    2015 49TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2015, : 431 - 436
  • [28] Montgomery modular multiplication and exponentiation in the residue number system
    Freking, William L.
    Parhi, Keshab K.
    Conference Record of the Asilomar Conference on Signals, Systems and Computers, 1999, 2 : 1312 - 1316
  • [29] Modified Montgomery modular multiplication and RSA exponentiation techniques
    McIvor, C
    McLoone, M
    McCanny, JV
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2004, 151 (06): : 402 - 408
  • [30] Elgamal cryptoalgorithm on the basis of the vector-module method of modular exponentiation and multiplication
    Yakymenko, Ihor
    Kasianchuk, Mykhailo
    Gomotiuk, Oksana
    Tereshchuk, Grygorii
    Ivasiev, Stepan
    Basistyi, Pavlo
    15TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET - 2020), 2020, : 926 - 929