1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
1 Montgomery Modular Multiplication in Hard- ware
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
FEI KEMT<br />
Algorithm 1 – 5 Key generation <strong>in</strong> ECC [78]<br />
Require: E is an EC over F, P is a po<strong>in</strong>t of order n on curve E.<br />
Ensure: Pair of private key and public key.<br />
1: Choose a random <strong>in</strong>teger d, 0 < d < n<br />
2: Q ⇐ dP<br />
3: return Q, the public key<br />
4: return d, the private key<br />
Algorithm 1 – 6 Message sign<strong>in</strong>g <strong>in</strong> ECC [78]<br />
Require: Message m with an arbitrary length, a hash value h(m) obta<strong>in</strong>ed from a<br />
one-way function.<br />
Ensure: Signature of the message m.<br />
1: Choose random <strong>in</strong>teger k, 0 < k < n<br />
2: kP ⇐ (x1, y1) and r ⇐ x1 mod n (0 < x1 < q − 1)<br />
3: if r = 0 then<br />
4: Go back to the step 1.<br />
5: end if<br />
6: k −1 mod n<br />
7: s ⇐ k −1 {h(m) + dr} mod n<br />
8: if s = 0 then<br />
9: Go back to the step 1.<br />
10: end if<br />
11: return (r, s)<br />
1.4 Conclusions<br />
In this section we have presented two nowadays most important public key cryp-<br />
tosystems, namely RSA and ECC.<br />
While RSA is massively applied by <strong>in</strong>dustry s<strong>in</strong>ce several years, the ECC as<br />
relatively new cryptographic algorithms just starts to w<strong>in</strong> as better choice for im-<br />
plementation of public-key algorithm especially for energy- and place-limited plat-<br />
forms. The possibility to use much shorter key, and therefore less heavy arithmetical<br />
operations makes from ECC an optimal algorithm for hard<strong>ware</strong> implementation.<br />
The description of both algorithms given <strong>in</strong> the thesis focuses on their most<br />
<strong>in</strong>tensively-used and heavy operation - the modular multiplication. This fact makes<br />
from the multiplication an important target for our research as the improvements<br />
18