期刊文献+

一种基于最小面积考虑的RSA公开密钥算法ASIC 被引量:2

ASIC Design of RSA Public-Key Algorithm Based on Area Optimization
下载PDF
导出
摘要  在基于面积最优化的考虑下,对RSA加解密算法进行了分析,对大整数的指数和求模运算进行了分解,并对最大数据长度为256位的RSA算法进行了版图设计。经仿真模拟测试,该芯片功能符合RSA公开密钥算法的要求。与其它实现RSA公开密钥算法的专用集成电路相比,该电路具有运算部件少、面积小的特点。 Based on area optimization, the RSA publickey algorithm is analyzed and the exponent and modulus operations of large integers are optimized in the paper An RSA encryption device is designed to perform 256bit encryption on a serial data stream Simulation on the design shows that the logic function of the device is in accordance with the RSA publickey algorithm Compared with other ASIC's, this design involves fewer operation units and has less area costs
出处 《微电子学》 CAS CSCD 北大核心 2003年第5期373-376,共4页 Microelectronics
基金 国家"863"高技术研究发展计划资助(20011AA141040)
关键词 公开密钥算法 RSA 有限状态机 专用集成电路 ASIC 加解密算法 Public-key algorithm RSA Finite state machine ASIC
  • 相关文献

参考文献7

  • 1Schneier B 吴世忠 译.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 2STALLINGS W 杨明 等译.密码编码学与网络安全:原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 3SchneierB著 吴世忠 祝世雄 张文政等译.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 4YarbroughJM (李书浩[译]).数字逻辑应用与设计[M].北京:机械工业出版社,2000..
  • 5王许书,李占才,曲英杰.RSA密码系统有效实现算法[J].小型微型计算机系统,2002,23(5):577-579. 被引量:6
  • 6Yarbrough J M.(李书浩[译]).数字逻辑应用与设计[M].北京:机械工业出版社,2000..
  • 7Rivest R, Shamir A, Adleman L. A method for obtaining digltal signatures and public-key cryptosystem [J]. Communications of the ACM, 1978; 21(2):120-126.

二级参考文献5

  • 1G.,EV,王玉祥.PRNS──有权剩余数系统[J].计算机学报,1994,17(8):624-629. 被引量:3
  • 2Rivest R.Shamir A.Adleman L.A method for obtaining digital signatures and public-key cryptosystem[J].Communications of the ACM.1978.V21,120~126.
  • 3Peter L.Montgomery.Modular multiplication without trial division[J].Mathematics of Computation,1985,v44(170),519~521.
  • 4J.Bos and M.Coster.Addition chain heuristics[C].Pro.Crypto89,Lecture Notes in Computer Science,1990.v435,400~407.Springer-Verlag.
  • 5Y.Yacobi.Exponentiating faster with addition chains[C].Advances in Cryptology-Eurocrypt90,Lecture Notes in Computer Science,1991.473,222~229.Springer-Verlag.

共引文献10

同被引文献21

  • 1韩宏宇,于莹华.远程教育在线考试的设计与实现[J].漯河职业技术学院学报,2003,2(1):1-3. 被引量:2
  • 2张凤生,来继敏,许焕新.网络在线考试系统分析与设计[J].河北软件职业技术学院学报,2005,7(4):58-60. 被引量:4
  • 3GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Science, 1984, 28(2): 270-299.
  • 4RlVEST R L, SHAMIR A, ADELMAN L. A method for obtaining digital signatures and public-key cryp- tosystems[J]. Communications of the ACM, 1978, 26: 120-126.
  • 5GROβSCHADL J. High-speed RSA hardware based on Barret's modular reduction method[C]//CHES 2000, Lecture Notes in Computer Science, 2000, 1965: 191- 203.
  • 6CORON J S, Joux A, KIZHVATOV I, NACCACHE D, PAILLIER P. Fault attacks on RSA signatures with partially unknown messages[CI//CHES 2009, Lecture Notes in Computer Science 5747, 2009: 444-456.
  • 7NITAJ A. Another generalization of Wiener's attack on RSA[C]//AfricaCrypt 2008, Lecture Notes in Computer Science 5023, 2008: 174-190.
  • 8HWANG R J, Su F F, HUANG L S. Fast firmware implementation of RSA-like security protocol for mobile devices[J]. Wireless Personal Communications, 2007, 42: 213-223.
  • 9Koc C K. speed RSA implementation[R]. RSA Laboratories RSA Data Security, 1994: 73-90.
  • 10YANG Chingchao, CHANG Tianshan. A new RSA cryptosystem hardware design based on montgomery's algorithm[J]. IEEE transactions on Circuits and Systems- II Analog and Digital Signal Processing, 1998, 45(7): 908-913.

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部