Implementation of the RSA Algorithm on a DataFlow Architecture

被引:0
作者
Bezanic, Nikola [1 ]
Popovic-Bozovic, Jelena [1 ]
Milutinovic, Veljko [2 ]
Popovic, Ivan [1 ]
机构
[1] Univ Belgrade, Sch Elect Engn, Dept Elect, Belgrade, Serbia
[2] Univ Belgrade, Sch Elect Engn, Dept Comp Engn, Belgrade, Serbia
来源
IPSI BGD TRANSACTIONS ON INTERNET RESEARCH | 2013年 / 9卷 / 02期
关键词
RSA; public key cryptography; dataflow architecture; Maxeler; Montgomery reduction; encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a dataflow-based implementation of the RSA, a popular algorithm used in the public-key cryptography. The RSA implementation relies on Montgomery reduction method that is used to make the encryption/decryption process more efficient. Montgomery method improves a modular exponentiation process which constitutes the algorithm computational core. An appropriate scheduling of the Montgomery word-based operations is chosen among several options from the open literature and accordingly implemented in C. Common CPU architectures suffer from the fixed word granularity constrained by the register width. On the other side, reconfigurable platforms often lack compiler support to provide high level system design. In this paper, we rely on Maxeler dataflow platform that offers the best from both worlds. Maxeler is a FPGA platform that offers a Java extension for hardware description. Algorithm modifications necessary for offloading the word-based multiplication to a dataflow engine are proposed. Our results show that multiplication accounts for about 40% of the total CPU encryption time. We have shown that multiplication part can be improved by approximately 70%, leading total improvement to 28%, according to the Amdahl's law. Directions for further potential improvements are also discussed.
引用
收藏
页码:11 / 16
页数:6
相关论文
共 11 条
[1]  
[Anonymous], 2011, CISC VIS NETW IND GL
[2]  
Baktir Selcuk, 2012, AESOP INT S COMP INF, P467
[3]  
Cetin Kaya Koc, 1994, TECHNICAL REPORT
[4]  
Emre Celebi, 2008, INT C SEC MAN SAM, P491
[5]  
John Fry, 2005, TECHNICAL REPORT
[6]  
Jovanovic Zoran, 2013, LECT NOTES COMPUTER
[7]   Analyzing and comparing Montgomery multiplication algorithms [J].
Koc, CK ;
Acar, T ;
Kaliski, BS .
IEEE MICRO, 1996, 16 (03) :26-33
[8]  
Maxeler, 2012, ACC TUT LOOPS PIP
[9]  
Maxeler, 2012, DAT PROGR MAXCOMPLIE
[10]  
MIPS Technologies, 2002, CISC VIS NETW IND GL