Skip to main content
Top

2010 | OriginalPaper | Chapter

39. Towards the Performance Optimization of Public-key Algorithms Using Fuzzy Modular Arithematic and Addition Chain

Authors : Gopinath Ganapathy, K. Mani

Published in: Machine Learning and Systems Engineering

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In most of the public-key cryptosystems like RSA, ElGamal, etc.; modular exponentiation plays a vital role for performing encryption/decryption operations. In other public-key cryptosystems like ECC, scalar point multiplication, kP where k is an arbitrary integer in the range 1 < k < ord(P) and P is a point in the elliptic curve is the central operation. In cryptographic algorithms, exponent is always an integer and can be performed faster than the traditional square and multiply method by iteratively reducing the small gain may be made if the numbers of multiplications are organized properly. For that some integer can be represented in the form of sum of squares and based on the sum of squares larger exponent e can be reduced into smaller one. Then, the addition chain is used to minimize the number of multiplications in the smaller exponent to speed up the operations. Similarly, in the case of ECC to speed up kP fuzzy modular arithmetic is considered.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A. Menezes, P. Van Oorschot, S. Vanstone, Handbook of Applied Cryptography, (CRC Press, Boca Raton, FL, 1997)MATH A. Menezes, P. Van Oorschot, S. Vanstone, Handbook of Applied Cryptography, (CRC Press, Boca Raton, FL, 1997)MATH
2.
go back to reference B. Moller, Improved techniques for fast exponentiation, Information Security and Cryptology – ICISC 2002 (Springer-Verlag, LNCS 2587), p. 298–312 B. Moller, Improved techniques for fast exponentiation, Information Security and Cryptology – ICISC 2002 (Springer-Verlag, LNCS 2587), p. 298–312
3.
go back to reference R. Cheung, W. Telle, P. Cheung, Customizable elliptic curve cryptosystems. IEEE TVLSI, 13(a), 1048–1049 (Sept 2005) R. Cheung, W. Telle, P. Cheung, Customizable elliptic curve cryptosystems. IEEE TVLSI, 13(a), 1048–1049 (Sept 2005)
4.
go back to reference D. Hankerson, L. Herandez, A. Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields (CHES, LNCS 1965, Springer-Verlag, Berlin Heidelberg, 2000), pp. 1–24 D. Hankerson, L. Herandez, A. Menezes, Software Implementation of Elliptic Curve Cryptography over Binary Fields (CHES, LNCS 1965, Springer-Verlag, Berlin Heidelberg, 2000), pp. 1–24
5.
go back to reference J.A. Anderson, J.M. Bell, Number Theory with Applications (Prentice Hall, Englewood. Cliffs, NJ, 1997) J.A. Anderson, J.M. Bell, Number Theory with Applications (Prentice Hall, Englewood. Cliffs, NJ, 1997)
6.
go back to reference M.D. Burton, Elementary Number Theory, 6th edn. (Tata Mc-Graw-Hill, New Delhi, 2007) M.D. Burton, Elementary Number Theory, 6th edn. (Tata Mc-Graw-Hill, New Delhi, 2007)
7.
go back to reference N. Koblitz, A Course in Number Theory and Cryptography, 2nd edn. (Springer-Verlag, Berlin, 1994)MATHCrossRef N. Koblitz, A Course in Number Theory and Cryptography, 2nd edn. (Springer-Verlag, Berlin, 1994)MATHCrossRef
8.
go back to reference D. Knuth, The Art of Computer Programming – Semi Numerical Algorithms, vol. 2, 3rd edn. (Addison-Wesley, 1998) D. Knuth, The Art of Computer Programming – Semi Numerical Algorithms, vol. 2, 3rd edn. (Addison-Wesley, 1998)
9.
go back to reference N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (Nov 1982)MathSciNet N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (Nov 1982)MathSciNet
10.
go back to reference J. Lutz, A. Hasan, High performance FPGA based elliptic curve cryptographic co-processor. ITCC 04, international conference on information technology coding and computing, vol. 2, 2004, p. 486 J. Lutz, A. Hasan, High performance FPGA based elliptic curve cryptographic co-processor. ITCC 04, international conference on information technology coding and computing, vol. 2, 2004, p. 486
11.
go back to reference I. Blake, G. Seroussi, N.P. Smart, Elliptic Curves in Cryptography, (Ser. London Math. Soc. Lecture Note Series, Cambridge University Press, New York, 1999)MATH I. Blake, G. Seroussi, N.P. Smart, Elliptic Curves in Cryptography, (Ser. London Math. Soc. Lecture Note Series, Cambridge University Press, New York, 1999)MATH
12.
go back to reference W. Adi, Fuzzy modular arithmetic for cryptographic schemes with applications for mobile security, IEEE, Institute of Technology Technical University of Braunschweig, Braunschweig, 2000, p. 263–265 W. Adi, Fuzzy modular arithmetic for cryptographic schemes with applications for mobile security, IEEE, Institute of Technology Technical University of Braunschweig, Braunschweig, 2000, p. 263–265
13.
go back to reference A. Hanoun, W. Adi, F. Mayer-Lindenberg, B. Soundan, Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology. IEEE, 2006, p. 325–326 A. Hanoun, W. Adi, F. Mayer-Lindenberg, B. Soundan, Fuzzy modular multiplication architecture and low complexity IPR-protection for FPGA technology. IEEE, 2006, p. 325–326
14.
go back to reference N. Cruz-Cortes et al., Finding Optimal Addition Chain Using a Genetic Algorithm Approach, LNCS, vol. 3801 (Spring Berlin/Heidberg, 2005), pp. 208–215 N. Cruz-Cortes et al., Finding Optimal Addition Chain Using a Genetic Algorithm Approach, LNCS, vol. 3801 (Spring Berlin/Heidberg, 2005), pp. 208–215
15.
go back to reference N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (Nov 1982)MathSciNet N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (Nov 1982)MathSciNet
16.
go back to reference Y.-J. Choi, M.-S. Kim, H.-R. Lee, H.-W. Kim, Implementation and analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB. PWAEST, 10, 130–134 (Dec 2005) Y.-J. Choi, M.-S. Kim, H.-R. Lee, H.-W. Kim, Implementation and analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB. PWAEST, 10, 130–134 (Dec 2005)
17.
go back to reference G. Ganapathy, K. Mani, Maximization of Speed in Elliptic Curve Cryptography Using Fuzzy Modular Arithmetic over a Microcontroller based Environment, Lecture Notes in Engineering and Computer Science WCECS (San Francisco, CA, 20–22 Oct 2009), pp. 328–332 G. Ganapathy, K. Mani, Maximization of Speed in Elliptic Curve Cryptography Using Fuzzy Modular Arithmetic over a Microcontroller based Environment, Lecture Notes in Engineering and Computer Science WCECS (San Francisco, CA, 20–22 Oct 2009), pp. 328–332
Metadata
Title
Towards the Performance Optimization of Public-key Algorithms Using Fuzzy Modular Arithematic and Addition Chain
Authors
Gopinath Ganapathy
K. Mani
Copyright Year
2010
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-90-481-9419-3_39

Premium Partner