2014
DOI: 10.1142/s0218126614500327
|View full text |Cite
|
Sign up to set email alerts
|

Software/Hardware Co-Design of Modular Exponentiation for Efficient Rsa Cryptosystem

Abstract: This paper presents an implementation of Rivest, Shamir and Adleman (RSA) cryptosystem based on hardware/software (HW/SW) co-design. The main operation of RSA is the modular exponentiation (ME) which is performed by repeated modular multiplications (MMs). In this work, the right-to-left (R2L) algorithm is used for the implementation of the ME as a programmable system on chip (PSoC). The processor MicroBlaze of Xilinx is used for flexibility. The R2L method is often suggested to improve the timing performance, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Algorithm 2 represents the scalable version of the original MMM algorithm (Montgomery, 1985), where the entire basics arithmetic operations are executed in radix-2 32 . The MMM computation using this algorithm is detailed in Issad et al (2014).…”
Section: Finite Field Arithmetic Operationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Algorithm 2 represents the scalable version of the original MMM algorithm (Montgomery, 1985), where the entire basics arithmetic operations are executed in radix-2 32 . The MMM computation using this algorithm is detailed in Issad et al (2014).…”
Section: Finite Field Arithmetic Operationsmentioning
confidence: 99%
“…Hence, we propose to perform MI using modular exponentiation (Mexp) according to Fermat's little theorem as it is shown in expression ( 19) (Hankerson et al, 2004). The easiest way to perform Mexp is the left-to-right binary method (Issad et al, 2014). The first approach [Figure 4(a)] is a single microblaze-based SW/HW implementation (1MbSW/HW).…”
Section: Finite Field Arithmetic Operationsmentioning
confidence: 99%
See 2 more Smart Citations
“…This theorem and, consequently, Equation (7), are valid when n is prime integer. The easiest way to perform Mexp is the left-to-right binary method [44].…”
Section: Software Developmentmentioning
confidence: 99%