04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FEI KEMT<br />

data<br />

<strong>in</strong>puts<br />

clock<br />

Look-up<br />

Table<br />

carry<br />

<strong>in</strong>put<br />

Carry<br />

Cha<strong>in</strong><br />

carry<br />

output<br />

D<br />

Flip<br />

Flop<br />

data<br />

outputs<br />

Figure 1 – 1 Typical architecture of the smallest functional unit <strong>in</strong> a FPGA.<br />

graphic algorithms and protocols can be represented as sequence of algebraic func-<br />

tions <strong>in</strong> chosen operational area. The operations <strong>in</strong> cryptography are often similar to<br />

the ones used <strong>in</strong> the fields mentioned above. Therefore the optimised blocks <strong>in</strong> struc-<br />

ture of FPGAs provide means for efficient realisation of cryptographic primitives,<br />

too.<br />

The additional property of cryptosystems - the security, is supported by vendors<br />

of the FPGAs by enhanc<strong>in</strong>g the devices with hard-wired encryption cores and special<br />

purpose memories. With rais<strong>in</strong>g importance of cryptography the FPGA vendors will<br />

be pushed to provide more and more features support<strong>in</strong>g security of FPGA-based<br />

cryptosystems as it was proposed <strong>in</strong> [93]. More <strong>in</strong>formation on FPGA features<br />

and their relation to implementation of cryptosystems <strong>in</strong>clud<strong>in</strong>g analysis of possible<br />

attacks can be found <strong>in</strong> [122].<br />

1.2 RSA Algorithm<br />

Nowadays the most popular asymmetric cryptosystem is RSA which was developed<br />

by Ronald Rivest, Adi Shamir and Leonard Adleman <strong>in</strong> 1978 [96].<br />

A private key for RSA algorithm consists of two large primes p and q with com-<br />

parable sizes and a secret exponent D. A public key is represented by an exponent<br />

E and modulus M, where<br />

M = pq (1.1)<br />

The Euler totien function φ(M) is def<strong>in</strong>ed as a number of positive <strong>in</strong>tegers smaller<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!