期刊文献+

基于资源复用的RSA加速器层次化架构 被引量:1

Hierarchical architecture of RSA accelerator based on hardware resource reuse
下载PDF
导出
摘要 为了解决RSA在模频繁变化情况下性能不足的问题,在已有蒙哥马利模乘器的基础上采用层次化架构设计复用硬件资源,实现了基于改进扩展欧几里德算法的偶数模逆器和R2mod M运算器。实验结果显示,在14%的额外硬件资源开销下RSA加速器性能在模频繁变化应用下比原来提高2倍。其中,模逆器性能较其他设计提高了3倍,R2mod M运算器性能比复用模幂电路的实现方法提高了一个数量级。 To improve the performance of the RSA cryptography system for the application of modular frequent change, a novel hierarchical architecture of RSA accelerator is proposed. With hardware resource reuse with Montgomery Modular Multiplier, both modular inverse and R2 mod M arithmetic function are supported by the proposed accelerator to improve performance of RSA key generation and Montgomery Modular multiplication. As the experiment shows, compared with previous works, the performance of RSA accelerator is 2 times faster for the application of modular frequent change under 14% resource overhead. What's more, the accelerator achieves one order of magnitude performance increasing for R2 mod M calculation comparing with the method of reusing Modular Exponentiation module.
出处 《计算机工程与应用》 CSCD 2014年第19期78-84,共7页 Computer Engineering and Applications
关键词 RSA加密算法 加速 层次化设计 资源复用 RSA encryption algorithm accelerate hierarchical design resource reuse
  • 相关文献

参考文献16

二级参考文献39

  • 1陈运,龚耀寰.RSA快速算法研究[J].信息安全与通信保密,2000,22(3):43-46. 被引量:4
  • 2孙登峰.有限域GF(p)中逆运算的计算机算法[J].信息安全与通信保密,1997,19(4):57-59. 被引量:5
  • 3Miller V S.Use of elliptic curves in cryptography[C]//CRYPTO'85, 1986: 417-426.
  • 4Koblitz N,Elleptic curve cryptosystems[J].Mathematics of computation, 1987,48 (4) : 203 -209.
  • 5Standard Specifications for Public-key Cryptography,IEEE Standard P1363 [S/OL], ( 2000).http ://gmuper.ie-ee.org/groups/1363.
  • 6Mcivor C J,Mcloone M,Mccanny J V.Improved montgomery modular inverse algorithm[J].IEEE Electronics Letters, 2004,40(18).
  • 7Kaliski B S.The montgomery inverse and its applications[J].IEEE Transactions on Computers, 1995,44(8) : 1064-1065.
  • 8Savas E,Koc C K.The montgomery modular inverse-revisited[J]. IEEE Transactions on Computers, 2000,49(7) :763-766.
  • 9Mcivor C J,Mcloone M.Hardware elliptic curve cryptographic processor over GF(p )[J].IEEE Transactions on Circuits and Systems, 2006,53(9) : 1946"1957.
  • 10Koc C K,Acar T,Kaliski B S.Analyzing and comparing montgomery multiplication algorithms[J].IEEE Micro, 1996,16(3) :26-33.

共引文献18

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部