Visible to the public Efficient modular multiplication algorithms for public key cryptography

TitleEfficient modular multiplication algorithms for public key cryptography
Publication TypeConference Paper
Year of Publication2014
AuthorsVollala, S., Varadhan, V.V., Geetha, K., Ramasubramanian, N.
Conference NameAdvance Computing Conference (IACC), 2014 IEEE International
Date PublishedFeb
ISBN Number 978-1-4799-2572-8
KeywordsAlgorithm design and analysis, BFW algorithms, binary exponentiation, bit forwarding algorithms, Ciphers, Conferences, cryptographic transformations, digital signature schemes, digital signatures, Encryption, modular exponentiation, Modular Multiplication, modular multiplication algorithms, public key cryptography, Public key cryptography(PKC), public key cryptosystems, RSA, store and forward algorithms, substitute and reward algorithms, word length
Abstract

The modular exponentiation is an important operation for cryptographic transformations in public key cryptosystems like the Rivest, Shamir and Adleman, the Difie and Hellman and the ElGamal schemes. computing ax mod n and axby mod n for very large x,y and n are fundamental to the efficiency of almost all pubic key cryptosystems and digital signature schemes. To achieve high level of security, the word length in the modular exponentiations should be significantly large. The performance of public key cryptography is primarily determined by the implementation efficiency of the modular multiplication and exponentiation. As the words are usually large, and in order to optimize the time taken by these operations, it is essential to minimize the number of modular multiplications. In this paper we are presenting efficient algorithms for computing ax mod n and axbymod n. In this work we propose four algorithms to evaluate modular exponentiation. Bit forwarding (BFW) algorithms to compute ax mod n, and to compute axby mod n two algorithms namely Substitute and reward (SRW), Store and forward(SFW) are proposed. All the proposed algorithms are efficient in terms of time and at the same time demands only minimal additional space to store the pre-computed values. These algorithms are suitable for devices with low computational power and limited storage.

URLhttps://ieeexplore.ieee.org/document/6779297
DOI10.1109/IAdCC.2014.6779297
Citation Key6779297