期刊文献+

一种可有效并行的RSA算法的研究 被引量:6

Study of efficient parallel RSA algorithm
下载PDF
导出
摘要 提出了一种改进RSA算法来提升RSA算法的解密性能。该改进算法在Multi-Power RSA算法的基础上通过将解密时的一些计算量转移到加密方的方式来加速RSA算法的解密过程。理论分析和实验结果表明,该改进算法不仅提升了RSA算法的解密性能,且该算法易于并行实现,可使得基于多核平台的RSA密码系统的整体性能得到进一步提升。 Aiming at speeding up RSA decryption,this paper proposed a variant of RSA cryptosystem by transferring some decryption computations to encryption based on Multi-Power RSA.The experimental result and the theoretical values show that the speed of the decryption have been substantially improved.The variant can be efficiently implemented in parallel and parallel implementation of the variant on multi-core devices can further improve the overall performance of RSA system.
出处 《计算机应用研究》 CSCD 北大核心 2011年第11期4345-4349,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(60963007) 云南省自然科学基金资助项目(2007F008M) 云南大学软件学院学科建设基金资助项目(2010KS01) 云南大学中青年骨干教师培养计划资助项目(21132014) 云南省软件工程重点实验室开放基金资助项目(2010KS01)
关键词 RSA 模幂 加速 并行 多核 RSA modular exponentiation accelerate parallel multi-core
  • 相关文献

参考文献25

  • 1RIVEST R, SHAMIR A, ALDEMAN L. A methoed for obtaining digital signatures and public-key cryptosystems [ J ]. Communications of the ACM,1978,21 (2) : 120-126.
  • 2BONEH D,SHACHAM H. Fast variants of RSA [ R ]. [ S. l. ] : RSA Laboratories Cryptobytes ,2002 : 1- 8.
  • 3TAKAGI T. Fast RSA-type cryptosystem modulo pkq [ C ]//Lecture Notes in Computer Science, vol 1462. [ S.l. ] :Springer, 1998:318- 326.
  • 4TAKAGI T. A fast RSA-type public-key primitive modulo pkq using Hensel Lifting [ J]. IEIGE Trans,2004,87-A( 1 ) :94-101.
  • 5VUILLAUME C. Efficiency comparison of several RSA variants [ D]. [ S. l. ] : Darmstadt University of Technology, 2003.
  • 6MATSUMOTO T, KATO K. Speeding up secret computations with insecure auxiliary device [ C]//Proc of the 8th Annual International Crypto Conference on Advances in Cryptology. London:Springer-Verlag, 1988.
  • 7CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Improving secure server performance by re-balancing SSL/TLS handshakes [ C ]//Proc of ACM Symposium on Information, Computer and Communications Security. New York : ACM Press,2006:26- 34.
  • 8李云飞,柳青,郝林,周保林.一种有效的RSA算法改进方案[J].计算机应用,2010,30(9):2393-2397. 被引量:26
  • 9LI Yun-fei, LIU Qing,LI Tong. Design and implementation of an improved RSA algorithm [ C ]//Proc of IEEE International Conference on eHealth Networking, Digital Ecosystems and Technologies. 2010: 390-393.
  • 10LIU Qing, LI Yun-fei, HAO Lin, et al. Two efficient variants of the RSA cryptosystem [ C]//Proe of International Conference on Computer Design and Applications. 2010:550-553.

二级参考文献60

  • 1刘近光,梁满贵.多核多线程处理器的发展及其软件系统架构[J].微处理机,2007,28(1):1-3. 被引量:22
  • 2齐芳,贾维嘉,王国军.SSL握手协议中客户端平衡密钥交换算法[J].计算机工程与应用,2007,43(19):1-3. 被引量:3
  • 3RIVEST R, SHAMIR A, ALDEMAN L. A method for obtaining digital signatures and public-key cryptosystems [ J]. Communications of the ACM, 1978, 21(2) : 120 - 126.
  • 4COLLINS T, HOPKINS D, LANGFORD S, et al. Public key cryptographic apparatus and method: US, 4218582 [ P]. 1997.
  • 5BONEH D, SHACHAM H. Fast variants of RSA [ J]. RSA Laboratories Crypto-bytes, 2002, 5(1): 1-8.
  • 6MATSUMOTO T, KATO K. Speeding up secret computations with insecure auxiliary devices [ C] //Proceedings of the gth Annual International Crypto Conference on Advances in Cryptology. London: Springer-Verlag, 1988:497-506.
  • 7PAXSON V, SOMMER R. An architecture for exploiting multi-core processors to parallelize network intrusion prevention [ C]//Proceedings of the IEEE Saruoff Symposium. Washington, DC: IEEE Computer Society, 2007:1 -7.
  • 8SILVERMAN R, WAGSTAFF S. A practical analysis of the elliptic curve factoring algorithm [ J]. Mathematics of Computation, 1993, 61(203) : 455 -462.
  • 9LENSTRA A K, VERHEUL E R. Selecting cryptographic key sizes [ J]. Journal of Cryptology: the Journal of the International Association for Cryptologic Research, 2001, 14(4): 255 -293.
  • 10TIMOTHY G, BEVERLY A. Patterns for parallel programming [ M]. Boston, MA: Addison-Wesley, 2005.

共引文献27

同被引文献48

  • 1石井,吴哲,谭璐,王昊鹏,王娜.RSA数据加密算法的分析与改进[J].济南大学学报(自然科学版),2013,27(3):283-286. 被引量:26
  • 2王茜,倪建伟.一种基于RSA的加密算法[J].重庆大学学报(自然科学版),2005,28(1):68-72. 被引量:14
  • 3张晓丰,樊启华,程红斌.密码算法研究[J].计算机技术与发展,2006,16(2):179-180. 被引量:20
  • 4王保仓,胡予濮.高密度背包型公钥密码体制的设计[J].电子与信息学报,2006,28(12):2390-2393. 被引量:13
  • 5兰丽娜,刘辛越.电子商务安全体系研究[J].信息安全与通信保密,2007,29(4):84-86. 被引量:6
  • 6Grossman R L,Gu Y,Sabala M,et al.Compute and storage clouds using wide area high performance networks [J].Future Generation Computer Systems, 2009,25(2) : 179-183.
  • 7Pearson S. Taking account of privacy when design- ing cloud computing services[C].Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Washington DC, USA: IEEE Computer Society, 2009: 44-52.
  • 8Ferraiolo D F,Kuhn D R.Role-based access control [C].In Proceedings of thel5th National Computer Security Conference, Baltimore, USA, 1992,8: 554-563.
  • 9Kuhn D R, Coyne E J, Weil T R. Adding attri- butes to role-based access control [J].IEEE Com- puter, 2010,43 (6) : 79-81.
  • 10Diffie W,Hellman ME.New directions in cryptography.IEEE Trans.in Information Theory,1976,22(6): 644-654.

引证文献6

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部