Enhanced Montgomery Multiplication on DSP Architectures for Embedded Public-Key Cryptosystems

被引:6
|
作者
Gastaldo, P. [1 ]
Parodi, G. [1 ]
Zunino, R. [1 ]
机构
[1] Univ Genoa, Dept Biophys & Elect Engn DIBE, Via Opera Pia 11a, I-16145 Genoa, Italy
关键词
D O I
10.1155/2008/583926
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Montgomery's algorithm is a popular technique to speed up modular multiplications in public-key cryptosystems. This paper tackles the efficient support of modular exponentiation on inexpensive circuitry for embedded security services and proposes a variant of the finely integrated product scanning (FIPS) algorithm that is targeted to digital signal processors. The general approach improves on the basic FIPS formulation by removing potential inefficiencies and boosts the exploitation of computing resources. The reformulation of the basic FIPS structure results in a general approach that balances computational efficiency and flexibility. Experimental results on commercial DSP platforms confirm both the method's validity and its effectiveness. Copyright (C) 2008 P. Gastaldo et al.
引用
下载
收藏
页数:9
相关论文
共 50 条
  • [31] Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
    Hutter, Michael
    Wenger, Erich
    JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1442 - 1460
  • [32] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [33] On non-Abelian homomorphic public-key cryptosystems
    Grigoriev D.
    Ponomarenko I.
    Journal of Mathematical Sciences, 2005, 126 (3) : 1158 - 1166
  • [34] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [35] High-speed algorithms for public-key cryptosystems
    Joseph, G
    Penzhorn, WT
    2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
  • [36] Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements
    Kong, Yinan
    Lai, Yufeng
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1039 - 1042
  • [37] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits
    Dima Grigoriev
    Ilia Ponomarenko
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
  • [38] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
  • [39] Homomorphic public-key cryptosystems and encrypting boolean circuits
    Grigoriev, Dima
    Ponomarenko, Ilia
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (3-4) : 239 - 255
  • [40] METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    RIVEST, RL
    SHAMIR, A
    ADLEMAN, L
    COMMUNICATIONS OF THE ACM, 1978, 21 (02) : 120 - 126