1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
FEI KEMT<br />
data<br />
<strong>in</strong>puts<br />
clock<br />
Look-up<br />
Table<br />
carry<br />
<strong>in</strong>put<br />
Carry<br />
Cha<strong>in</strong><br />
carry<br />
output<br />
D<br />
Flip<br />
Flop<br />
data<br />
outputs<br />
Figure 1 – 1 Typical architecture of the smallest functional unit <strong>in</strong> a FPGA.<br />
graphic algorithms and protocols can be represented as sequence of algebraic func-<br />
tions <strong>in</strong> chosen operational area. The operations <strong>in</strong> cryptography are often similar to<br />
the ones used <strong>in</strong> the fields mentioned above. Therefore the optimised blocks <strong>in</strong> struc-<br />
ture of FPGAs provide means for efficient realisation of cryptographic primitives,<br />
too.<br />
The additional property of cryptosystems - the security, is supported by vendors<br />
of the FPGAs by enhanc<strong>in</strong>g the devices with hard-wired encryption cores and special<br />
purpose memories. With rais<strong>in</strong>g importance of cryptography the FPGA vendors will<br />
be pushed to provide more and more features support<strong>in</strong>g security of FPGA-based<br />
cryptosystems as it was proposed <strong>in</strong> [93]. More <strong>in</strong>formation on FPGA features<br />
and their relation to implementation of cryptosystems <strong>in</strong>clud<strong>in</strong>g analysis of possible<br />
attacks can be found <strong>in</strong> [122].<br />
1.2 RSA Algorithm<br />
Nowadays the most popular asymmetric cryptosystem is RSA which was developed<br />
by Ronald Rivest, Adi Shamir and Leonard Adleman <strong>in</strong> 1978 [96].<br />
A private key for RSA algorithm consists of two large primes p and q with com-<br />
parable sizes and a secret exponent D. A public key is represented by an exponent<br />
E and modulus M, where<br />
M = pq (1.1)<br />
The Euler totien function φ(M) is def<strong>in</strong>ed as a number of positive <strong>in</strong>tegers smaller<br />
6