New fast modular multiplication method and its application to modular exponentiation-based cryptography

被引:0
|
作者
Hayashi, Akira [1 ]
机构
[1] Kanazawa Institute of Technology, Ishikawa, 921-8501, Japan
关键词
Algorithms - Computational complexity - Computational methods - Estimation - Parallel processing systems;
D O I
10.1002/1520-6440(200012)83:123.0.CO;2-5
中图分类号
学科分类号
摘要
In order to apply exponentiation-based cryptography, such as RSA cryptography and El Gamal cryptography, to a wide range of practical problems, it is desired to devise faster ciphering and deciphering processes. This paper proposes a new algorithm for improving the speed of the exponentiation-based computation. The proposed method is based on the idea in the exponentiation computation that the remainder in square/multiplication with modulus n is constructed from the remainders with moduli different from n. More precisely, the method is based on the following two ideas. (1) The remainder in regard to n can be constructed from the remainder with modulus n + 1 and the remainder with modulus n + 2. (2) It often happens that n + 1 and n + 2 can easily be factorized, even if n is a prime number or difficult to be factorized into prime factors. Then, the Chinese remainder theorem can be applied to the remainder calculation with those numbers as the moduli. The bit computational complexity of the proposed method is estimated, and it is shown, assuming the parallel computation, that the computational complexity is less than in the conventional method. Especially when n + 1 and n + 2 are factorized almost uniformly into K factors, the computational complexity asymptotically follows 1/K. The proposed method will be useful not only in the cryptography requiring the exponentiation computation, but also in improving the speed of the signal processing that requires similar computations.
引用
收藏
页码:88 / 93
相关论文
共 50 条
  • [41] CONSTANT-OPTIMIZED QUANTUM CIRCUITS FOR MODULAR MULTIPLICATION AND EXPONENTIATION
    Markov, Igor L.
    Saeedi, Mehdi
    QUANTUM INFORMATION & COMPUTATION, 2012, 12 (5-6) : 361 - 394
  • [42] Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography
    Tian, Jing
    Lin, Jun
    Wang, Zhongfeng
    PROCEEDINGS OF THE 2019 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS 2019), 2019, : 97 - 102
  • [43] FPGA-Based Efficient Modular Multiplication for Elliptic Curve Cryptography
    Hossain, Md Selim
    Kong, Yinan
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 191 - 195
  • [44] Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
    Akleylek, Sedat
    Tok, Zaliha Yuce
    IEICE ELECTRONICS EXPRESS, 2014, 11 (22):
  • [45] A fast modular multiplication method based on the Lempel-Ziv binary tree
    Chen, CY
    Liu, TC
    COMPUTER COMMUNICATIONS, 1999, 22 (09) : 871 - 874
  • [46] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
  • [47] Broken-Karatsuba multiplication and its application to Montgomery modular multiplication
    Ding, Jinnan
    Li, Shuguo
    2017 27TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2017,
  • [48] Efficient Modular Multiplication Algorithms for Public Key Cryptography
    Vollala, Satyanarayana
    Varadhan, V. V.
    Geetha, K.
    Ramasubramanian, N.
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 74 - 78
  • [49] Efficient PSoC Implementation of Modular Multiplication and Exponentiation Based on Serial-Parallel Combination
    Issad, M.
    Boudraa, B.
    Anane, M.
    Bellemou, A. M.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (13)
  • [50] A fast modular multiplication method using Yacobi's algorithm
    Chen, CY
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 50 - 50