High-Performance Hardware of the Sliding-Window Method for Parallel Computation of Modular Exponentiations

Nedjah, Nadia; de Macedo Mourelle, Luiza
December 2009
International Journal of Parallel Programming;Dec2009, Vol. 37 Issue 6, p537
Academic Journal
Modular exponentiation is a basic operation in various applications, such as cryptography. Generally, the performance of this operation has a tremendous impact on the efficiency of the whole application. Therefore, many researchers have devoted special interest to providing smart methods and efficient implementations for modular exponentiation. One of these methods is the sliding-window method, which pre- processes the exponent into zero and non-zero partitions. Zero partitions allow for a reduction of the number of modular multiplications required in the exponentiation process. In this paper, we devise a novel hardware for computing modular exponentiation using the sliding-window method. The partitioning strategy used allows variable-length non-zero partitions, which increases the average number of zero partitions and so decreases that of non-zero partitions. It performs the partitioning process in parallel with the pre-computation step of the exponent so no overhead is introduced. The implementation is efficient when compared against related existing hardware implementations.


Related Articles

  • Keys to the kingdom. Dibbell, Julian // Time International (South Pacific Edition);11/11/96, Issue 46, pTD28 

    Focuses on the importance of encryption in an online world. Worries of governments around the world about wiretapping and other surveillance ; Civil libertarians who fear the that government antiencryption measures could cripple our last best hope for real privacy; Work of mathematicians...

  • IT's cryptography conundrum. Kerstetter, Jim // PC Week;07/12/99, Vol. 16 Issue 28, p10 

    Focuses on the benefits and drawbacks of encryption technologies as of July 12, 1999. Effects of encryption on security; Inability of encrypted traffic to be scanned by firewalls, anti-virus software or mobile scanning software; Vulnerability; Lack of knowledge of encryption; Details of a...

  • Security and Composition of Multiparty Cryptographic Protocols. Canetti, Ran // Journal of Cryptology;2000, Vol. 13 Issue 1, p143 

    We present general definitions of security for multiparty cryptographic protocols, with focus on the task of evaluating a probabilistic function of the parties' inputs. We show that, with respect to these definitions, security is preserved under a natural composition operation. The definitions...

  • Cryptanalysis of the ANSI X9.52 CBCM Mode. Biham, Eli; Knudsen, Lars R. // Journal of Cryptology;2002, Vol. 15 Issue 1, p47 

    In this paper we cryptanalyze the CBCM mode of operation, which was almost included in the ANSI X9.52 Triple-DES Modes of Operation standard. The CBCMmode is a Triple-DES CBC variant which was designed against powerful attacks which control intermediate feedback for the benefit of the...

  • Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). Abadi, Martin; Rogaway, Phillip // Journal of Cryptology;2002, Vol. 15 Issue 2, p103 

    Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability. There is an...

  • A Novel Approach Share Key Refreshing for Long Term Protection in Distributed Cryptography by Proactive Security. Retoliya, Rajkumari; Tripathi, Anshu // International Journal of Computer Science Engineering & Technolo;Jul2011, Vol. 1 Issue 6, p290 

    Security is an important issue for networks, especially for those security-sensitive applications. In the entire environment of security, it is necessary to ensure privacy. This Paper provides share key refreshing technique for maintaining the security of the system, even when some nodes are in...

  • Intel Focuses on PC Security. Spooner, John G. // PC Week;02/01/99, Vol. 16 Issue 5, p37 

    Focuses on Intel Corp.'s strategy for computer security in early 1999. Efforts to develop a security architecture for personal computers that works with cryptography and digital certificates; Plans to support the Common Data Security Architecture, Microsoft Corp.'s Crypto application program...

  • SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES. Atanasiu, Adrian; Savu, Laura // Journal of Information Systems & Operations Management;May2012, Vol. 6 Issue 1, p19 

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the...

  • Permutation Steganography for Polygonal Meshes Based on Coding Tree. Shihchun Tu; Hungwei Hsu; Wenkai Tai // International Journal of Virtual Reality;2010, Vol. 9 Issue 4, p55 

    We propose a coding tree for permutation steganography in polygonal meshes. Instead of conceptually building a complete binary tree for remaining embedding/extracting primitives to encode/decode bitstream, our method lengthens bitstream by exploiting the coding tree of the primitives, a binary...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics