An Optimized Montgomery Modular Multiplication Algorithm for Cryptography

نویسنده

  • K. Balasubadra
چکیده

Montgomery modular multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystems. The previous Montgomery multipliers perform a single Montgomery multiplication in approximately 2n clock cycles and it requires more number of addition stages for large word length additions, where n is the size of operands in bits. In this paper, new Montgomery modular multiplier is proposed which performs the same operation in approximately n clock cycles with almost same clock period. The proposed multiplier uses carry select adders (CSLAs) to perform large word length additions. Carry select adder is based on the concept of Binary to Excess-1convertor (BEC). The proposed algorithm using the concept of precomputing partial results using two possible assumptions regarding the most significant bit of the previous word. The optimized algorithm is simulated using Xilinx ISE 12.1i and it is implemented using Virtex5 FPGA device. Keyword Rivest, Shamir, Adleman(RSA), Carry Select Adders (CSLAs) and Binary to Excess-1convertor (BEC).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Optimized Montgomery Modular Multiplication Algorithm for Cryptography

Montgomery modular multiplication is one of the fundamental operations used in cryptographicalgorithms, such as RSA andElliptic Curve Cryptosystem. The previous Montgomery multipliers perform a single Montgomery multiplication in approximately 2n clock cycles and it requires more numberof addition stages for large word length addition, where nis the size of of operandsoperands inbits. Inthis pa...

متن کامل

An RNS Based Montgomery Modular Multiplication Algorithm For Cryptography

Montgomery modular multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystem. The previous Montgomery multipliers perform a single Montgomery multiplication in approximately 2n clock cycles and it requires more number of addition stages for large word length addition, where n is the size of operands in bits. In this paper, ...

متن کامل

Implementation of Modular Exponentiation Using Montgomery Algorithms

Several algorithms for Public Key Cryptography (PKC), such as RSA, Diffie-Hellman, and Elliptic Curve Cryptography are used for secure communications. These algorithms require modular exponentiation as their basic operation. Modular exponentiation implies repeated modular multiplication which is computationally very costly as the large operands are used. Therefore computation time is very large...

متن کامل

An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm

Montgomery modular multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystems. At CHES 1999, Tenca and Koç introduced a now-classical architecture for implementing Montgomery multiplication in hardware. With parameters optimized for minimum latency, this architecture performs a single Montgomery multiplication in approximat...

متن کامل

An Optimized Hardware Architecture of Montgomery Multiplication Algorithm

Montgomery multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystems. At CHES 1999, Tenca and Koç introduced a nowclassical architecture for implementing Montgomery multiplication in hardware. With parameters optimized for minimum latency, this architecture performs a single Montgomery multiplication in approximately 2n cl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013