An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications
نویسندگان
چکیده
Efficient computation of the modular exponentiations is very important and useful for public-key cryptosystems. In this paper, an efficient parallel binary exponentiation algorithm is proposed which based on the Montgomery multiplication algorithm, the signed-digit-folding (SDF) and common-multiplicand-multiplicand (CMM) techniques. By using the CMM technique of computing the common part from two modular multiplications, the same common part in two modular multiplications can be computed once rather twice, we can thus improve the efficiency of the binary exponentiation algorithm by decreasing the number of modular multiplications. By dividing the bit pattern of the minimal-signed-digit recoding exponent into three equal length parts and using the technique of recording the common parts in the folded substrings, the proposed SDFCMM algorithm can improve the efficiency of the binary algorithm, thus can further decrease the computational complexity of modular exponentiation. Furthermore, by using the proposed parallel SDF-CMM Montgomery binary exponentiation algorithm, on average the total number of singleprecision multiplications can be reduced by about 61.3% and 74.1% as compared with ChangKuo-Lin’s CMM modular exponentiation algorithm and Ha-Moon’s CMM Montgomery modular exponentiation algorithm, respectively.
منابع مشابه
Efficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملOn Multiple Precision Based Montgomery Multiplication without Precomputation of N0´ = -N0-1 mod W
An efficient implementation of modular exponentiation, i.e., the main building block of many public key cryptographic devices, is achieved by algorithmic optimization of the Montgomery modular multiplication algorithm based on multiple precision such that pre-computation of N0 ́ = N0 -1 mod W can be avoided. This can be attained by modifications of the multiplier used.
متن کاملEfficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications
Cryptographic operations performed on an embedded device are vulnerable to side channel analysis and particularly to differential and correlation power analysis. The basic protection against such attacks is to randomize the data all along the cryptographic computations. In this paper we present a modular multiplication algorithm which can be used for randomization. We show that we can use it to...
متن کاملModular Multiplication Algorithm in Cryptographic Processor: A Review and Future Directions
The strength of public-key cryptography depends on the degree of difficulty of a private key to be determined from its corresponding public key. Such a Key can be generated from computationally high radix arithmetic operations like modular exponentiation with very large integer values. To perform this modular exponentiation, different multiplication algorithms like Montgomery algorithm, Karatsu...
متن کاملAn Abstract of the Thesis of High-speed Algorithms & Architectures for Number-theoretic Cryptosystems
approved: C etin K. Ko c Computer and network security systems rely on the privacy and authenticity of information, which requires implementation of cryptographic functions. Software implementations of these functions are often desired because of their exibility and cost e ectiveness. In this study, we concentrate on developing high-speed and area-e cient modular multiplication and exponentiati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Informatica, Lith. Acad. Sci.
دوره 16 شماره
صفحات -
تاریخ انتشار 2005