A low cost RSA chip based on CRT

被引:0
|
作者
Wu, M [1 ]
Zeng, XY [1 ]
Han, J [1 ]
Ma, YX [1 ]
Wu, YY [1 ]
Zhang, GQ [1 ]
机构
[1] Fudan Univ, State Key Lab ASIC & Syst, Shanghai 200433, Peoples R China
来源
PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3 | 2005年
关键词
public-key cryptosystem; RSA; CRT; modified Montgomery algorithm; Digital Signature and Verification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, the authors present a VLSI design and ASIC implementation of a low cost RSA cryptosystem based on the modified Montgomery algorithm and the Chinese Remainder Theory (CRT), as well as a new scheduling scheme. The CRT technique improves data throughput, and the new scheduling scheme reduces hardware complexity. As a result, a 1024-bit modular exponentiation calculation can be performed in about 1.2 mega cycles, and the core size is less than 54K gates. With 40MHz system clock, a signature rate over 33kbps can be achieved. Using the SMIC 0.25um CMOS process, the clock frequency can be up to 125MHz and in sequence the signature rate to 100kbps.
引用
收藏
页码:334 / 338
页数:5
相关论文
共 50 条
  • [31] VLSI design of an RSA encryption/decryption chip using systolic array based architecture
    Sun, Chi-Chia
    Lin, Bor-Shing
    Jan, Gene Eu
    Lin, Jheng-Yi
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2016, 103 (09) : 1538 - 1549
  • [32] Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication
    Hlavac, Martin
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 128 - 140
  • [33] Unified Low Cost Crypto Architecture Accelerating RSA/SHA-1 for Security Processor
    Huang, Wei
    You, Kaidi
    Zhang, Suiyu
    Han, Jun
    Zeng, Xiaoyang
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 151 - 154
  • [34] Comment on traceability on RSA-based partially signature with low computation
    Wu, LC
    Yeh, YS
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) : 1344 - 1348
  • [35] Improving timing attack on RSA-CRT via error detection and correction strategy
    Chen, CaiSen
    Wang, Tao
    Tian, Junjian
    INFORMATION SCIENCES, 2013, 232 : 464 - 474
  • [36] RSA Encryption/Decryption Implementation Based on Zedboard
    Bai, Xu
    Jiang, Lei
    Liu, Xinxing
    Tan, Jianlong
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 114 - 121
  • [37] Side channel attack of multiplication in GF(q) –application to secure RSA-CRT
    Sen XU
    Weija WANG
    Xiangjun LU
    Zheng GUO
    Junrong LIU
    Dawu GU
    ScienceChina(InformationSciences), 2019, 62 (03) : 202 - 204
  • [38] New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents
    Lu, Yao
    Zhang, Rui
    Lin, Dongdai
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 151 - 162
  • [39] HW/SW implementation of RSA digital signature on a RISC-V-based System-on-Chip
    Karmakar, Apurba
    Sanchez-Solano, Santiago
    Martinez-Rodriguez, Macarena C.
    Brox, Piedad
    2023 38TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS, DCIS, 2023,
  • [40] FA-LLLing for RSA: Lattice-based Fault Attacks against RSA Encryption and Signature
    Barbu, Guillaume
    2022 WORKSHOP ON FAULT DETECTION AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2022), 2022, : 30 - 37