期刊文献+

Montgomery算法在RSA中的应用及其优化 被引量:7

Optimization and Application of Montgomery Algorithm in RSA
在线阅读 下载PDF
导出
摘要 Montgomery算法作为一种快速模乘算法,常被应用于RSA、ElGamal等公钥密码算法的基本运算。对RSA和Montgomery算法进行简要的介绍和分析,并阐述了普通的Montgomery算法在RSA中的应用的思路和步骤。最常用的传统算法选取参数r为2的幂,基数为2,通过对普通算法的思路和步骤的分析,讨论改变其中参数r和基数的选择来减少乘方的模乘法数,并同时应用Dussé快速算法,从而达到大大提高运算速度的目的。 Montgomery algorithm is a fast modular multiplication algorithm and is widely used in the base operation of public- key cryptography algorithms such as RSA and ElGamal. Firstly, the algorithm of RSA and Montgomery are simply introduced and analyzed. Method and calcutive steps of normal application of Montgomery algorithm in RSA are expatiated also. Algorithm in most conmmon use chooses parameter r to power of 2 and the base to 2. Via analyzing the method and calcutive steps of normal algorithm, discusses changing the numerical value of parameter r and the base and use the fast algorithm of Dussé in the meantime, to advance the calcutive velocity a lot.
出处 《计算机技术与发展》 2007年第6期145-146,150,共3页 Computer Technology and Development
关键词 RSA MONTGOMERY算法 模乘 Dussé快速算法 RSA montgomery algorithm modular multiplication fast algorithm of Dussé
  • 相关文献

参考文献8

  • 1LU,Jun-ming(卢君明),LIN,Zheng-hui(林争辉).A NEW RSA CRYPTOSYSTEM HARDWARE IMPLEMENTATION BASED ON MONTGOMERY'S ALGORITHM[J].Journal of Shanghai Jiaotong university(Science),2002,7(1):46-49. 被引量:5
  • 2Rivest R L,Shamir A,Adleman L M.A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J].Communication of the ACM,1978,21 (2):i20-126.
  • 3Montgomery P L.Modular multiplication without trial division[J].Mathematics of Computation,1985,44(170):519-521.
  • 4王金荣,陈勤,丁宏.大数模乘算法的分析与研究[J].计算机工程与应用,2004,40(24):70-72. 被引量:9
  • 5Welschenbach M..Kryptographie in C and C + + weite,überarbeitete und erweiterte Auflage[M]..北京:电子工业出版社,,2003..54-80..
  • 6孔凡玉,于佳,李大兴.一种改进的Montgomery模乘快速算法[J].计算机工程,2005,31(8):1-3. 被引量:8
  • 7Dusse S R,Jr Kaliski B S.A Cryptographic Library for the Motorola DSP56000[C] //Advances in Cryptology-EUROCRYPT 90.[s.l.]:Springer-Verlag,1990:230-244.
  • 8Walter C D.Montgomery Exponentiation Needs No Final Subtractions[J].Electronic Letters,1999,35 (21):1831 -1832.

二级参考文献35

  • 1R L Rivest,A Shamir,L Adleman. A Method of Obtaining Digital Signature and Public Key Cryptosystems[J].Comm of ACM, 1978; 21 (2):120~126
  • 2T E1Gamal.A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans on Information Theory,1985;IT-31 (4) :469~472
  • 3G R Blakley. A Computer Algorithm for Calculating the Product AB Modulo M[J].IEEE Trans, 1983; C-32(5) :497~500
  • 4F E Su ,T Hwang. Comments on Iterative Modular Multiplication Without Magnitude Comparison[C].In:Proceeding of the Sixth National Conference on Information Security,Taichung,Taiwan,1996:21~22
  • 5C K Koc,C Y Hung. Adaptive M-ary Segmentation and Canonical Recoding Algorithms for Multiplication of Large Binary Numbers[J].Computers and Mathematics with Applications, 1992; 24 (3): 3~ 12
  • 6B J Phillips,N Burgess. Implementing 1024-bits RSA Exponentiation on a 32-bits Processor Core[C].In :IEEE International Conference on Application Specific Systems,Architecture,and Processors(ASAP'00),2000
  • 7D E Knuth. The Art of Computer Programming:Seminumerical Algorithms volume 2[M].Second edition, Reading, MA: Addison-Wesley,1981
  • 8P Barrett.Implementing the Rivest,Shamir and Adleman Public-key Encryption Algorithm on a Standard Digital Signal Processor[C].In:Cryptology-CRYPTO'86 Proceedings,vol ,263 of Lecture Notes in Computer Science, Springer-Verlag, 1987: 311~323
  • 9J-J Quisquater. Encoding System According to the So-called RSA Method,by Means of a Microcontroller and Arrangement Implementing this System[P].U S Patent #5,166,978,24,1992
  • 10C D Walter. Faster Modular Multiplication by Operand Scaling[C].In:Proceedings of CRYPTO'91,Springer-Verlag,1992:313~323

共引文献16

同被引文献57

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部