ALGORITHM DESIGN AND THEORETICAL ANALYSIS OF A NOVEL CMM MODULAR EXPONENTIATION ALGORITHM FOR LARGE INTEGERS

被引:3
作者
Rezai, Abdalhossein [1 ]
Keshavarzi, Parviz [2 ]
机构
[1] Isfahan Univ Technol IUT Branch, Acad Ctr Educ Culture & Res ACECR, Esfahan, Iran
[2] Semnan Univ, Elect & Comp Engn Fac, Semnan, Iran
来源
RAIRO-THEORETICAL INFORMATICS AND APPLICATIONS | 2015年 / 49卷 / 03期
关键词
Modular multiplication; canonical recoding; modular exponentiation; public-key cryptosystem; high speed arithmetic; MONTGOMERY ALGORITHM; MULTIPLICATION; IMPLEMENTATION; ARCHITECTURE; EFFICIENT;
D O I
10.1051/ita/2015007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modular exponentiation is an important operation in public-key cryptography. The Common-Multiplicand-Multiplication (CMM) modular exponentiation is an efficient exponentiation algorithm. This paper presents a novel method for speeding up the CMM modular exponentiation algorithm based on a Modified Montgomery Modular Multiplication (M4) algorithm. The M4 algorithm uses a new multi bit scan-multi bit shift technique by employing a modified encoding algorithm. In the M4 algorithm, three operations (the zero chain multiplication, the required additions and the nonzero digit multiplication) are relaxed to a multi bit shift and one binary addition in only one clock cycle. Our computational complexity analysis shows that the average number of required multiplication steps (clock cycles) is considerably reduced in comparison with other CMM modular exponentiation algorithms.
引用
收藏
页码:255 / 268
页数:14
相关论文
共 34 条
[1]   SIGNED-DIGIT REPRESENTATIONS OF MINIMAL HAMMING WEIGHT [J].
ARNO, S ;
WHEELER, FS .
IEEE TRANSACTIONS ON COMPUTERS, 1993, 42 (08) :1007-1010
[2]   High-radix montgomery modular exponentiation on reconfigurable hardware [J].
Blum, T ;
Paar, C .
IEEE TRANSACTIONS ON COMPUTERS, 2001, 50 (07) :759-764
[3]   A SIGNED BINARY MULTIPLICATION TECHNIQUE [J].
BOOTH, AD .
QUARTERLY JOURNAL OF MECHANICS AND APPLIED MATHEMATICS, 1951, 4 (02) :236-240
[4]  
Dusse S. R., 1990, P ADV CRYPT EUROCRYP, P230
[5]   EXPONENTIATION USING CANONICAL RECODING [J].
EGECIOGLU, O ;
KOC, CK .
THEORETICAL COMPUTER SCIENCE, 1994, 129 (02) :407-417
[6]   A high-speed design of Montgomery multiplier [J].
Fan, Yibo ;
Ikenaga, Takeshi ;
Goto, Satoshi .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (04) :971-977
[7]   A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication [J].
Fournaris, AP ;
Koufopavlou, O .
2005 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), VOLS 1-6, CONFERENCE PROCEEDINGS, 2005, :4645-4648
[8]   A common-multiplicand method to the Montgomery algorithm for speeding up exponentiation [J].
Ha, JC ;
Moon, SJ .
INFORMATION PROCESSING LETTERS, 1998, 66 (02) :105-107
[9]   Low-Power, High-Speed Unified and Scalable Word-Based Radix 8 Architecture for Montgomery Modular Multiplication in GF(P) and GF(2n) [J].
Ibrahim, Atef ;
Elsimary, Hamed ;
Gebali, Fayez .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2014, 39 (11) :7847-7863
[10]  
Keshavarzi P., 1998, Proceedings of First International Symposium on Communication Systems and Digital Signal Processing, 1998, P516