Another way of doing RSA cryptography in hardware

L. Batina, G. Muurling

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageProfessioneel

    Samenvatting

    In this paper we describe an efficient and secure hardware implementation of the RSA cryptosystem. Modular exponentiation is based on Montgomery’s method without any modular reduction achieving the optimal bound. The presented systolic array architecture is scalable in severalparameters which makes it possible to implement Compaq’s MultiPrime TM in a very efficient way. According to a developed performance model the influence of different parameters is investigated. This platform is optimised for Multiprime as an example for the RSA cryptosystem. In this work we give details about this scheme, which uses three or more factors of the composite N. Security of this scheme, related to this architecture is also presented.
    Originele taal-2Engels
    TitelCryptography and coding : 8th IMA International Conference, Cirencester, UK, December 17 - 19, 2001 ; proceedings
    RedacteurenB. Honary
    Plaats van productieBerlin
    UitgeverijSpringer
    Pagina's364-373
    ISBN van geprinte versie978-3-540-43026-1
    DOI's
    StatusGepubliceerd - 2001
    Evenementconference; IMA international congress -
    Duur: 1 jan. 2001 → …

    Publicatie series

    NaamLecture notes in computer science
    Volume2260

    Congres

    Congresconference; IMA international congress
    Periode1/01/01 → …
    AnderIMA international congress

    Vingerafdruk

    Duik in de onderzoeksthema's van 'Another way of doing RSA cryptography in hardware'. Samen vormen ze een unieke vingerafdruk.

    Citeer dit