2019
DOI: 10.1016/j.procs.2019.11.050
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Step 5: Compute private key, d, from the following equation: ed  1 mod (n). In fact, the key to find the result in this step is to use extended Euclidean algorithm [16][17][18]. Process 2 (Encryption Process): it is the process to transform plaintext, m, where 0 < m < n, as unreadable message or ciphertext, c, before sending to receiver by using the following equation:…”
Section: Related Work 21 Rsamentioning
confidence: 99%
“…Step 5: Compute private key, d, from the following equation: ed  1 mod (n). In fact, the key to find the result in this step is to use extended Euclidean algorithm [16][17][18]. Process 2 (Encryption Process): it is the process to transform plaintext, m, where 0 < m < n, as unreadable message or ciphertext, c, before sending to receiver by using the following equation:…”
Section: Related Work 21 Rsamentioning
confidence: 99%
“…Computing d, from e*d mod Φ (n) = 1, is performed in the last step. In fact, Extended Euclidean Algorithm or the improved methods [14], [15] are the method to calculate d. The second process is the encryption process. It will convert the original plaintext, m, as unreadable message or ciphertext, c, from the equation: c = m e mod n. However, m will be recovered by using the decryption equation: m = c d mod n in the last process.…”
Section: Rsamentioning
confidence: 99%
“…The next step is to select a public key, t, with the following condition, 1<t<  (n) and gcd(t,  (n) )=1. After that, a private key, h, can be computed from t*h mod  (n)=1 by using some of extended euclidean algorithms [16][17][18][19]. The second process is an encryption process to convert original plaintext, m, as ciphertext, c, from the equation: c=m t mod n. The last process is a decryption process to recover m by using the equation: m=c h mod n. Generally, it is very difficult to break this system when bit-length of n is at least 1024 and all parameters are strong.…”
Section: Related Work 21 Rsamentioning
confidence: 99%