Tripartite modular multiplication

被引:13
作者
Sakiyama, Kazuo [1 ,2 ,3 ]
Knezevic, Miroslav [1 ,2 ]
Fan, Junfeng [1 ,2 ]
Preneel, Bart [1 ,2 ]
Verbauwhede, Ingrid [1 ,2 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Louvain, Belgium
[2] Interdisciplinary Ctr Broad Band Technol, B-3001 Louvain, Belgium
[3] Univ Electrocommun, Dept Informat & Commun Engn, Tokyo 1828585, Japan
关键词
Modular multiplication; Barrett reduction; Karatsuba multiplication; Montgomery reduction; Public-key cryptography; CRYPTOSYSTEMS;
D O I
10.1016/j.vlsi.2011.03.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new modular multiplication algorithm that allows one to implement modular multiplications efficiently. It proposes a systematic approach for maximizing a level of parallelism when performing a modular multiplication. The proposed algorithm effectively integrates three different existing algorithms, a classical modular multiplication based on Barrett reduction, the modular multiplication with Montgomery reduction and the Karatsuba multiplication algorithms in order to reduce the computational complexity and increase the potential of parallel processing. The algorithm is suitable for both hardware implementations and software implementations in a multiprocessor environment. To show the effectiveness of the proposed algorithm, we implement several hardware modular multipliers and compare the area and performance results. We show that a modular multiplier using the proposed algorithm achieves a higher speed comparing to the modular multipliers based on the previously proposed algorithms. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:259 / 269
页数:11
相关论文
共 14 条
[1]  
[Anonymous], 1985, LNCS
[2]  
BARRETT P, 1984, THESIS OXFORD U
[3]  
BARRETT P, 1986, P CRYPTO 86, P311
[4]  
DHEM JF, 1998, THESIS
[5]   Montgomery modular multiplication algorithm on multi-core systems [J].
Fan, Junfeng ;
Sakiyama, Kazuo ;
Verbauwhede, Ingrid .
2007 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS, VOLS 1 AND 2, 2007, :261-266
[6]  
KAIHARA ME, 2005, LECT NOTES COMPUTER, V3659
[7]  
KARATSUBA A, 1963, TRANSLATION PHYS DOK, V145, P595
[8]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[9]  
MONTGOMERY PL, 1985, MATH COMPUT, V44, P519, DOI 10.1090/S0025-5718-1985-0777282-X
[10]   Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field [J].
Potgieter, MJ ;
van Dyk, BJ .
2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, :187-192