RSA Cryptosystem with Modified Montgomery Modular Multiplier

被引:0
作者
Mahapatra, Priyanka Priyadarsini [1 ]
Agrawal, Sonali [1 ]
机构
[1] Amrita Univ, Dept Elect & Commun Engn, Bengaluru, India
来源
2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2017年
关键词
Cryptography; Montgomery modular multiplier; Carry save addition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Rivest, Shamir, Adleman (RSA) algorithm can be used in cryptography to send confidential messages in secure manner. RSA cryptosystem is based on modular multiplication to factorize the large integers. Montgomery modular multiplication can be used as modular multiplication because it is one of the efficient and fastest modular multiplication. Montgomery algorithm is based on add and shift operation, so Carry save adder (CSA) can be used in order to overcome the carry propagation at each addition. In this Montgomery multiplier, the CSA choses the operands and converts the addition result from carry save format to binary form. Accordingly, the architecture can use less hardware and give short critical path delay to do one modular multiplication. In this paper, the Montgomery modular multiplication uses a modified or configurable Carry save adder (CCSA). The CCSA is designed with one full adder and two half adders to reduce the delay. Still CCSA suffers from high power consumption. In order to reduce the power consumption, the full adder used in CCSA with two multiplexers has been proposed. The proposed Montgomery modular multiplier has the capability to provide 26% average reduction in power when compared with previous designs.
引用
收藏
页码:75 / 80
页数:6
相关论文
共 50 条
  • [21] The Montgomery modular inverse -: Revisited
    Savas, E
    Koç, ÇK
    IEEE TRANSACTIONS ON COMPUTERS, 2000, 49 (07) : 763 - 766
  • [22] Improving Radix-4 Feedforward Scalable Montgomery Modular Multiplier by Precomputation and Double Booth-Encodings
    Wu, Tao
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 596 - 600
  • [23] Integer factorization for RSA cryptosystem under a PVM environment
    Department of Aviation and Communication Electronics, Chinese Air Force Institute of Technology, Kaohsiung 82047, Taiwan
    不详
    Comput Syst Sci Eng, 2007, 1-2 (25-35):
  • [24] Improved secure RSA cryptosystem for data confidentiality in cloud
    Thangavel M.
    Varalakshmi P.
    Thangavel, M. (thangavelmuruganme@gmail.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (09): : 261 - 277
  • [25] PARALLEL IMPLEMENTATION OF THE RSA PUBLIC-KEY CRYPTOSYSTEM
    CHIOU, CW
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 1993, 48 (3-4) : 153 - 155
  • [26] An RNS Montgomery modular multiplication algorithm
    Bajard, JC
    Didier, LS
    Kornerup, P
    IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (07) : 766 - 776
  • [27] Improvement to Montgomery modular inverse algorithm
    Deng, Rui
    Zhou, Yujie
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1207 - 1210
  • [28] Differential power analysis resistant hardware implementation of the RSA cryptosystem
    Bayam, Keklik Alptekin
    Ors, Berria
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (01) : 129 - 140
  • [29] Differential Power Analysis resistant hardware implementation of the RSA cryptosystem
    Bayam, Keklik Alptekin
    Ors, Berna
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 3314 - +
  • [30] Octonion Polynomials for a More Secure RSA Public Key Cryptosystem
    Abboud, Sahab Mohsen
    Ajeena, Ruma Kareem K.
    Yassein, Hassan Rashed
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2025, 20 (01) : 281 - 284