A scalable dual mode arithmetic unit for public key cryptosystems

被引:22
作者
Crowe, F [1 ]
Daly, A [1 ]
Marnane, W [1 ]
机构
[1] Natl Univ Ireland Univ Coll Cork, Dept Elect & Elect Engn, Cork, Ireland
来源
ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1 | 2005年
关键词
D O I
10.1109/ITCC.2005.33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Elliptic Curve Cryptosystems (ECC) have become popular in recent years due to their smaller key sizes than traditional public key schemes such as RSA. However the gap between the size of these systems is increasing as security requirements become more demanding due to cryptanalytic advances. At current security levels of 80 bits, the corresponding key sizes for ECC and RSA are 160 and 1, 024 bits respectively. Although the ECC key size is attractive for embedded applications, the popularity of RSA means that it will remain in legacy applications for the foreseeable future. This paper proposes a dual mode arithmetic unit capable of supporting the underlying field operations performed by both the ECC and RSA public key schemes. A hardware optimised version of the Montgomery algorithm is employed to perform modular multiplication efficiently. The disparity in key sizes is addressed by combining the dual processors to operate in parallel for ECC or in a pipelined series for RSA.
引用
收藏
页码:568 / 573
页数:6
相关论文
共 50 条
  • [31] A study of public key cryptosystems based on quasigroups
    Kumar, Satish
    Gupta, Indivar
    Gupta, Ashok Ji
    CRYPTOLOGIA, 2023, 47 (06) : 511 - 540
  • [32] Analysis of two knapsack public key cryptosystems
    Peng, Liqiang
    Hu, Lei
    Xu, Jun
    Xie, Yonghong
    Zuo, Jinyin
    IET COMMUNICATIONS, 2013, 7 (15) : 1638 - 1643
  • [33] Security and design of knapsack public key cryptosystems
    He, Jingmin
    Lu, Kaicheng
    Ching Hua Ta Hsueh Hsueh Pao/ Journal of Ching Hua University, 1988, 28 (01): : 89 - 97
  • [34] ALGORITHMS FOR PUBLIC KEY CRYPTOSYSTEMS - THEORY AND APPLICATION
    LAKSHMIVARAHAN, S
    ADVANCES IN COMPUTERS, 1983, 22 : 45 - 108
  • [35] On the Differential Security of Multivariate Public Key Cryptosystems
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 130 - 142
  • [36] Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements
    Kong, Yinan
    Lai, Yufeng
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1039 - 1042
  • [37] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [38] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [39] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [40] Software Implementation of a Pairing Function for Public Key Cryptosystems
    Kanbara, Yusuke
    Teruya, Tadanori
    Kanayama, Naoki
    Nishide, Takashi
    Okamoto, Eiji
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,