Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography

被引:1
作者
Thomas, Aswathi [1 ]
Manuel, Ebin M. [1 ]
机构
[1] Govt Coll Engn, Dept ECE, Idukki, Kerala, India
来源
INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015) | 2016年 / 24卷
关键词
cryptosystem; RSA; ECC; modular multiplication; Montgomery multiplication;
D O I
10.1016/j.protcy.2016.05.179
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Elliptic Curve cryptosystem has replaced the prevailing first generation public key algorithms - RSA and Diffie - Hellman due its shorter key size requirement. This paper presents a modified Elliptic Curve and RSA cryptosystem by incorporating a newly designed Montgomery multiplier algorithm for better efficiency. The inherent disadvantage of delay due to the large number of computations in Elliptic Curve cryptography is improved substantially by the implantation of the modified Montgomery algorithm in it. The simulation results show significant improvement in terms of speed and power. (C) 2016 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:911 / 917
页数:7
相关论文
共 50 条
  • [31] Efficient Elliptic Curve Cryptography for Embedded Devices
    Liu, Zhe
    Weng, Jian
    Hu, Zhi
    Seo, Hwajeong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [32] Optimized design method on elliptic curve cryptography
    Cui, Xining
    Yang, Jingwei
    Ye, Hong
    Dai, Xiaodi
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (01): : 69 - 74
  • [33] A high speed processor for elliptic curve cryptography over NIST prime field
    Hu, Xianghong
    Li, Xueming
    Zheng, Xin
    Liu, Yuan
    Xiong, Xiaoming
    IET CIRCUITS DEVICES & SYSTEMS, 2022, 16 (04) : 350 - 359
  • [34] On the Performance of GPU Public-Key Cryptography
    Neves, Samuel
    Araujo, Filipe
    ASAP 2011 - 22ND IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2011), 2011, : 133 - 140
  • [35] Highly Parallel Modular Multiplier for Elliptic Curve Cryptography in Residue Number System
    Asif, Shahzad
    Kong, Yinan
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2017, 36 (03) : 1027 - 1051
  • [36] Distributed Key Management Based on Elliptic Curve Cryptography for Mobile Ad hoc Network
    Zhang Yuchen
    Liu Jing
    Wang Yadi
    Han Jihong
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 777 - 780
  • [37] A Biometeric Based Secure Session Key Agreement using Modified Elliptic Curve Cryptography
    Subramaniam, Usha
    Subbaraya, Kuppuswami
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (02) : 155 - 162
  • [38] The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation
    van Rijswijk-Deij, Roland
    Hageman, Kaspar
    Sperotto, Anna
    Pras, Aiko
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) : 738 - 750
  • [39] A Design of Certificate Authority Based on Elliptic Curve Cryptography
    Yuan Yangtao
    Liu Quan
    Li Fen
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 454 - 457
  • [40] Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography
    Menandas, Josepha J.
    Christo, Mary Subaja
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,