Computing Mod Without Mod

نویسندگان

  • Mark A. Will
  • Ryan K. L. Ko
چکیده

Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some algorithms having a recommend size of 2048-bits or more. However most modern processors only support computation on 64-bits at a time. Therefore standard operations with large numbers are more complicated to implement. One operation that is particularly challenging to implement efficiently is modular reduction. In this paper we propose a highly-efficient algorithm for solving large modulo operations; it has several advantages over current approaches as it supports the use of a variable sized lookup table, has good spatial and temporal locality allowing data to be streamed, and only requires basic processor instructions. Our proposed algorithm is theoretically compared to widely used modular algorithms, before practically compared against the state-of-the-art GNU Multiple Precision (GMP) large number library.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ON THE SZEGED INDEX OF NON-COMMUTATIVE GRAPH OF GENERAL LINEAR GROUP

Let $G$ be a non-abelian group and let $Z(G)$ be the center of $G$. Associate with $G$ there is agraph $Gamma_G$ as follows: Take $Gsetminus Z(G)$ as vertices of$Gamma_G$ and joint two distinct vertices $x$ and $y$ whenever$yxneq yx$. $Gamma_G$ is called the non-commuting graph of $G$. In recent years many interesting works have been done in non-commutative graph of groups. Computing the clique...

متن کامل

A note on the new basis in the mod 2 Steenrod algebra

‎The Mod $2$ Steenrod algebra is a Hopf algebra that consists of the primary cohomology operations‎, ‎denoted by $Sq^n$‎, ‎between the cohomology groups with $mathbb{Z}_2$ coefficients of any topological space‎. ‎Regarding to its vector space structure over $mathbb{Z}_2$‎, ‎it has many base systems and some of the base systems can also be restricted to its sub algebras‎. ‎On the contrary‎, ‎in ...

متن کامل

A novel caching mechanism for peer-to-peer based media-on-demand streaming

In recent years, peer-to-peer networks and application-level overlays without dedicated infrastructure have been widely proposed to provide on-demand media services on the Internet. However, the scalability issue, which is caused by the asynchronism and the sparsity of the online peers, is a major problem for deploying P2P-based MoD systems, especially when the media server’s capacity is limite...

متن کامل

اثر الگوهای متفاوت پوشش کاسپ بر روی مقاومت به شکست دندانهای پرمولر فک بالا در ترمیم MOD کامپوزیتی

  اثر الگوهای متفاوت پوشش کاسپ بر روی مقاومت به شکست دندانهای پرمولر فک بالا در ترمیم MOD کامپوزیتی       دکتر نرگس پناهنده1 - دکتر نجمه جوهر2   1- استادیار گروه آموزشی دندانپزشکی ترمیمی دانشکده دندانپزشکی دانشگاه علوم پزشکی شهیدبهشتی، تهران، ایران   2- دستیار تخصصی گروه آموزشی دندانپزشکی ترمیمی دانشگاه علوم پزشکی شهید صدوقی یزد، یزد، ایران     چکیده   زمینه و هدف : شکست دندان یکی از شایعترین م...

متن کامل

Influence of gene duplication and X-inactivation on mouse mitochondrial malic enzyme activity and electrophoretic patterns.

We have investigated, with and without the influence of X-inactivation, the relationship between autosomal gene-dosage and gene-product in a mammalian system, the mouse. The gene was mitochondrial malic enzyme (Mod-2), shown to lie on Chromosome 7 between the albino (c) and shaker-1 (sh-1) loci, and the enzyme was its product, mitochondrial malic enzyme (MOD-2). Gene duplication, with and witho...

متن کامل

Fermat’s Test

Fermat’s little theorem says for prime p that ap−1 ≡ 1 mod p for all a 6≡ 0 mod p. A naive extension of this to a composite modulus n ≥ 2 would be: for a 6≡ 0 mod n, an−1 ≡ 1 mod n. Let’s call this “Fermat’s little congruence.” It may or may not be true. When n is prime, it is true for all a 6≡ 0 mod n. But when n is composite it usually has many counterexamples. Example 1.1. When n = 15, the t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014