04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

FEI KEMT<br />

Algorithm 1 – 5 Key generation <strong>in</strong> ECC [78]<br />

Require: E is an EC over F, P is a po<strong>in</strong>t of order n on curve E.<br />

Ensure: Pair of private key and public key.<br />

1: Choose a random <strong>in</strong>teger d, 0 < d < n<br />

2: Q ⇐ dP<br />

3: return Q, the public key<br />

4: return d, the private key<br />

Algorithm 1 – 6 Message sign<strong>in</strong>g <strong>in</strong> ECC [78]<br />

Require: Message m with an arbitrary length, a hash value h(m) obta<strong>in</strong>ed from a<br />

one-way function.<br />

Ensure: Signature of the message m.<br />

1: Choose random <strong>in</strong>teger k, 0 < k < n<br />

2: kP ⇐ (x1, y1) and r ⇐ x1 mod n (0 < x1 < q − 1)<br />

3: if r = 0 then<br />

4: Go back to the step 1.<br />

5: end if<br />

6: k −1 mod n<br />

7: s ⇐ k −1 {h(m) + dr} mod n<br />

8: if s = 0 then<br />

9: Go back to the step 1.<br />

10: end if<br />

11: return (r, s)<br />

1.4 Conclusions<br />

In this section we have presented two nowadays most important public key cryp-<br />

tosystems, namely RSA and ECC.<br />

While RSA is massively applied by <strong>in</strong>dustry s<strong>in</strong>ce several years, the ECC as<br />

relatively new cryptographic algorithms just starts to w<strong>in</strong> as better choice for im-<br />

plementation of public-key algorithm especially for energy- and place-limited plat-<br />

forms. The possibility to use much shorter key, and therefore less heavy arithmetical<br />

operations makes from ECC an optimal algorithm for hard<strong>ware</strong> implementation.<br />

The description of both algorithms given <strong>in</strong> the thesis focuses on their most<br />

<strong>in</strong>tensively-used and heavy operation - the modular multiplication. This fact makes<br />

from the multiplication an important target for our research as the improvements<br />

18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!