期刊文献+

快速模幂算法及其硬件实现 被引量:8

Fast Modular Exponentiation Algorithm and Its Hardware Implementation
在线阅读 下载PDF
导出
摘要 RSA公开密钥加密技术是目前使用最广泛的加密技术。文章提出了快速并行的算法 ,使RSA公开密钥加密速度提高了很多。模乘算法是模幂算法的核心 ,基于 Montgomery算法 ,提出了一种改进的快速高基模乘算法 ,该算法求出了乘法的最终积 ,使得乘法和模减运算同时进行 ,并且所有的运算是以字节为单位。模幂算法采用从右到左扫描指数的方法 ,可以使得两次模乘运算同时进行。算法的硬件结构由模乘控制器、模幂控制器、数据寄存器和模乘运算单元构成。对于 51 2位操作数 ,在 1 0 0 MHz时钟频率下 ,加密速率约为 390 RSA public key crypto-system is a relatively safe technology,which is widely used in today’s secure electronic communication.In this paper,the parallelity of the algorit hm is improved in many ways,so the encryption rate increases.Modular multiplication algorithm is the core of modular exponentiation.A fast modular multiplication algorithm based on Montgomery’s algorithm is proposed .In the improved algorithm,the final product of the multip lication is calculated,which makes multiplication and modular reductio n run at the same time.All the operations are based on words.Modul ar exponentiation algorithm scans encryption from right to left,so t wo modular multiplications can be processed parallelly.The hardware arc hitecture is made up of modular controller,modular exponentiation contr oller,data register,and modular multiplication operation units.At a cl ock of 100 MHz,the encryption rate is about 390 kb/s for 51 2-b operands.
作者 周芬 高志强
出处 《微电子学》 CAS CSCD 北大核心 2000年第6期391-394,共4页 Microelectronics
关键词 模幂算法 模乘算法 公开密钥加密 网络数据安全 Modular exponentiation alg orithm Modular multiplication algorithm Public-key cryptography Net work data security
  • 相关文献

参考文献1

  • 1Su Chihyuang,IEEE Trans VLSI Syst,1999年,7卷,2期,280页

同被引文献61

  • 1肖国镇.伪随机序列及其应用[M].北京:国防工业出版社,1985..
  • 2来学嘉.MC公钥密码体制.电子学报,1986,23(4):91-94.
  • 3Bruce Schneier.应用密码学一协议,算法与C源程序[M].机械工业出版社,..
  • 4[1]Su Chihyuaug, Hwang Shiham, Chen Posong. An Improved Montgomery' s Algorithm for High-speed RSA Public-kev Cryptosystem [J]. IEEE Trans VLSI Systems, 1999,7(2) :280-284.
  • 5[2]Guo Dong-hui, Cheng L M, Cheng L L. A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks[J]. Applied Intelligence, 1999,10(1) :71-84.
  • 6[3]STAL100 Sralling. W Data and Computer Communications, 6th Edition[ M ]. Upper Saddle River, NJ:Prentice Hall, 2000.
  • 7[4]Kelber K N.Dimensional Uniform Probability Distri-bution in No~linear Auto- regressive Filter Structures[J]. IEEE Trans Circ & Syst 1,2000,47(9): 1413-1418.
  • 8[5]Rdeke E, Korzonnek J. Distributed Information Management in Virtual Engineering Enteqrise by GEN[A]. Proe of the 9th Int Workshop on Re Search Issues on Data Engineering Infomation Technology for Virtual Enterprises[C]. Sydney, 1999. 237-245.
  • 9[6]Y S Kim, W S Kang, J R Choi. Asvncbromous Implementation of 1024-bit Modular Proeessor for RSA Cryptosystem [C]. APASIC2000. Proceedings of the Second iEEE Asia Pacific Conference on, 2000.
  • 10[6]C.E.Shannon. Communication theory of secrecy systems[J]. Bell System Tech nical Journal, 1949, 28(4): 656-715.

引证文献8

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部