2022
DOI: 10.11591/ijeecs.v25.i2.pp1087-1093
|View full text |Cite
|
Sign up to set email alerts
|

Modular reduction with step-by-step using of several bits of the reducible number

Abstract: Although public key cryptography is known to solve the problem of physically secure key exchange, the main drawback of this system is its low performance during encrypting and decrypting data. One of the ways to solve this issue is to increase the speed of the modular reduction operation, one of the basic operations of asymmetric cryptoalgorithms. A new method of step-by-step reduction by the N-bit module P using several bits of the 2Nbit reducible number A in one step is proposed in this paper. The method is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Decryption refers to the process of converting ciphertext to plaintext. The two types of cryptography are private key and public key cryptography [11]. In private key cryptography, the key required for the encryption and decryption procedures is the same.…”
Section: Introductionmentioning
confidence: 99%
“…Decryption refers to the process of converting ciphertext to plaintext. The two types of cryptography are private key and public key cryptography [11]. In private key cryptography, the key required for the encryption and decryption procedures is the same.…”
Section: Introductionmentioning
confidence: 99%