期刊文献+

基于改进型Montgomery模块的RSA算法及其Verilog模型的实现

Realization of RSA algorithm and its Verilog model based on modified Montgomery module
下载PDF
导出
摘要 详细分析了RSA加密算法的原理及优化方法,提出一种高效可行改进型硬件模块的实现方案,并给出了效率分析以及在硬件平台上的仿真结果分析;通过仿真分析发现,相比以往的算法模型,该方案在时序以及面积上均做到了相当程度的优化,硬件的占用面积大幅度减少,具体的性能及功耗、稳定性有较大提高,为工程应用提供了良好的借鉴。 The principles and optimization method of RSA encryption algorithm are analyzed in detail in this paper. A feasi-ble and efficient implementation scheme of modified hardware modules is proposed. The analyses of efficiency and simulation re-sults on the hardware platform are conducted. The simulation results show that,compared with the previous algorithm models, the scheme has already been optimized to a certain extent in both the time sequence and the volume,reduced the area that the hardwares used to occupy significantly,improved performance,power consumption,stability greatly and provided a good reference for engineering applications.
出处 《现代电子技术》 2014年第17期82-85,共4页 Modern Electronics Technique
关键词 RSA 不对称加密 硬件实现成本 MONTGOMERY算法 RSA asymmetric encryption hardware implementation cost Montgomery algorithm
  • 相关文献

参考文献12

  • 1RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and publick -key cryptosystems [J]. Communications of the ACM, 1978,21(2): 120-126.
  • 2KOC C K. RSA hardware implementation [R). Redwood City: RSA Laboratories, 1995.
  • 3RSA Laboratories. The publick - key cryptography standards (PKCS) [R). [S.1.): RSA Data Security, Inc., 1993.
  • 4VANDERSYPEN L M K. NMR quantum computing: Realizing Shor's algorithm [J]. Nature, 2001, 414: 883-887.
  • 5TENCA A F, KOC C K. A scalable architecture for modular multipli - cation based on montgomery's algorithm [J]. Lecture Notes in Computer Science, 1999, 1717: 94-108.
  • 6COOK D L, IOANNIDIS 1. KEROMYTIS AD, et al. Cryptographics: Secret key cryptography using graphics cards [C]II Proceedings of RSA Conference. New York: Springer, 2005: 540-574.
  • 7CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Improving secure server performance by Rebalancing SSLlTLS handshakes [EB/OL). [2012-01-01). http://www.citeseerx.ist.psu.edu.
  • 8CHE Shuai, BOYER M, MENG Jia - yuan, et al. A performance study of general-purpose applications on graphics processors using CUDA [J]. Journal of Parallel and Distributed Computing, 2008, 68( 10): 1370-1380.
  • 9WALTER C D. Precise bounds for montgomery modular multiplication and some potentially insecure RSA Moduli [M). San Jose: CT-RSA, 2002.
  • 10SHAND M, VUILLEMIN J. Fast implementation of RSA cryptography [C]// Proceedings of 11 th IEEE Synposium on Computer Arithmetic. [S.I.]: IEEE, 1993: 252-259.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部