Abstract:This paper describes some recently successful results i n the CMOS VLSI implementation of public-key data encryption algorithms. Architectural details, circuits, and prototype test results are presented for RSA encryption and multiplication in the finite field GF(2"). These designs emphasize high throughput and modularity. An asynchronous modulo multiplier i s described which permits a significant improvement in RSA encryption throughput relative to previously described synchronous implementations.
“…Orton et al gave a nice collection of modular multiplication algorithms in [145]. They presented the implementation results of one of the algorithms which was most efficient according to their results.…”
This paper presents an overview of hardware implementations for the two commonly used types of Public Key Cryptography, i.e. RSA and Elliptic Curve Cryptography (ECC), both based on modular arithmetic. We first discuss the mathematical background and the algorithms to implement these cryptosystems. Next an overview is given of the different hardware architectures which have been proposed in the literature.
“…Orton et al gave a nice collection of modular multiplication algorithms in [145]. They presented the implementation results of one of the algorithms which was most efficient according to their results.…”
This paper presents an overview of hardware implementations for the two commonly used types of Public Key Cryptography, i.e. RSA and Elliptic Curve Cryptography (ECC), both based on modular arithmetic. We first discuss the mathematical background and the algorithms to implement these cryptosystems. Next an overview is given of the different hardware architectures which have been proposed in the literature.
“…Much has been written on the subject of hardware implementations of RSA [1314,1474,1456,1316,1485,874,1222,87,1410,1409,1343,998,367,1429,523,772]. Good survey articles are [258,872].…”
“…A chip developed by Orton, Peppard, and Tavares in 1986 (Queen's 86) uses an asynchronous pulse-timed adder [22]. The average length of the longest continuous carry propagation in a k-bit addition is within log2 k bits.…”
Section: Review Of Modular Multiplicationmentioning
confidence: 99%
“…There are many variations on this theme [1], [7], [19], [22], [32], however, the number of bits that can be reduced in parallel is limited because the number of stored multiples of the modulus grows exponentially with the number of bits being reduced. There are many variations on this theme [1], [7], [19], [22], [32], however, the number of bits that can be reduced in parallel is limited because the number of stored multiples of the modulus grows exponentially with the number of bits being reduced.…”
Section: Review Of Modular Multiplicationmentioning
We present a new serial-parallel concurrent modular-multiplication algorithm and architecture suitable for standard RSA eneryption. In the new scheme, multiplication is performed modulo a multiple of the RSA modulus n, which has a diminished-radix form 2 k -v, where k and v are positive integers and v < n. This design is the first concurrent modular multiplier to use a diminished-radix algorithm and to pipeline concurrent modular-reduction to optimize the clock rate. For a modular multiplier of order ranging from 1 to 10 (number of multiplier bits per clock cycle), a faster clock rate and throughput is possible than with other known designs including those of Brickell, Morita, Sedlak and Golze, and Miyaguchi. Throughput estimates for 512-bit RSA decryption range from 100 kbit/s in a serial mode to 650 kbit/s with a modular multiplier of order 10, at a clock rate of 20 MHz on 1.5/~m CMOS.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.