Visible to the public A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language

TitleA Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Publication TypeConference Paper
Year of Publication2020
AuthorsBan, T. Q., Nguyen, T. T. T., Long, V. T., Dung, P. D., Tung, B. T.
Conference Name2020 International Conference on Computational Intelligence (ICCI)
Keywordsaverage complexity evaluation exponentiation algorithm, Benchmark testing, C language, C languages, Complexity theory, composability, compositionality, Computational Intelligence, cryptography, cryptology, exponentiation, Fast Exponentiation Algorithms, Joye ladder exponentiation algorithm, left-to-right signed digit square exponentiation algorithm, left-to-right square and multiply exponentiation algorithm, Libraries, library GMP, modular exponentiation algorithms, Montgomery ladder exponentiation algorithm, multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm, pubcrawl, public key cryptography, Public Key Cryptography., Registers, Resiliency, right-to-left square and multiply exponentiation algorithm, RSA, Scalability, theoretical cryptography, word length 1024.0 bit
AbstractThis research aims to implement different modular exponentiation algorithms and evaluate the average complexity and compare it to the theoretical value. We use the library GMP to implement seven modular exponentiation algorithms. They are Left-to-right Square and Multiply, Right-to-left Square and Multiply, Left-to-right Signed Digit Square, and Multiply Left-to-right Square and Multiply Always Right-to-left Square and Multiply Always, Montgomery Ladder and Joye Ladder. For some exponent bit length, we choose 1024 bits and execute each algorithm on many exponent values and count the average numbers of squares and the average number of multiplications. Whenever relevant, our programs will check the consistency relations between the registers at the end of the exponentiation.
DOI10.1109/ICCI51257.2020.9247766
Citation Keyban_benchmarking_2020