Fast Squaring Algorithm Design and Complexity Numerical Analyses for Public-Key Cryptosystems

نویسندگان

  • Chia-Long Wu
  • Der-Chyuan Lou
  • Te-Jen Chang
چکیده

Modular exponentiation is an important operation in several public-key cryptography. The standard squaring algorithm is well-known and the Guajardo-Paar algorithm fixes the improper carry handling bug produced by the standard squaring algorithm, but produces error-indexing bug. In this paper, one squaring algorithm is proposed, which stores base products into the Look-Up Table before the squaring computation and base size comparison method. The proposed algorithm can not only evaluate squaring efficiently but also avoid bugs produced in other proposed algorithms (the Guajardo-Paar algorithm and the Yang-Heih-Laih algorithm). The performance of the proposed algorithm is 1.615 times faster than the standard squaring algorithm and much faster than others’ algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Design and Implementation of Fast Multiplication Algorithms in Public Key Cryptosystems for Smart Cards

Most practical public-key cryptosystems are based on modular exponentiation. A modular exponentiation is composed of repeated modular multiplications. Several methods have been proposed to reduce the execution time of a modular exponentiation, essentially aiming to reduce the execution time of each modular multiplication. The goal of this paper is to investigate three different integer multipli...

متن کامل

Look-Up Table-based Montgomery Algorithm in GF(2k) for Public-Key Cryptosystem

The current paper presents a fast implementation of finite field multiplication, squaring, and exponentiation operations using two look-up tables, thereby reducing the number of operations, saving time through precomputation, and avoiding the complicated computations required in the Montgomery method. Furthermore, look-up table-based algorithms have the advantage of speed and are particularly s...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks

In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and countermeasures for public key cryptosystems were against the main stage (square and multiply stage) of the modular exponentiation (or the point multiplication on an elliptic curve). We have many algorithms which achie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008