04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Abstract <strong>in</strong> English<br />

In the thesis we deal with two elementary blocks used <strong>in</strong> public key cryptosystems<br />

– the first block is a modular multiplier for very long operands, the second one<br />

is random number generator. Both blocks are designed on programmable target<br />

platform (FPGA devices) what allows quick prototyp<strong>in</strong>g of proposed systems.<br />

Our ma<strong>in</strong> goal <strong>in</strong> case of multiplier is to achieve a scalable and parametrised<br />

solution, which is easily portable and adaptable accord<strong>in</strong>g to a f<strong>in</strong>al target platform<br />

and processed data. Note that due to requested high flexibility of solution the<br />

achieved speed for clock<strong>in</strong>g is lower than <strong>in</strong> case of dedicated design focused on speed.<br />

On the other hand, our solution is perfect for prototyp<strong>in</strong>g and proof-of-concept<br />

designs approach. In the thesis we analyse algorithm improvements <strong>in</strong> relation to<br />

technical features of chosen FPGA families. Obta<strong>in</strong>ed universal arithmetic solution<br />

needs to be enhanced with equally universal <strong>in</strong>terface <strong>in</strong> order to connect a control<br />

unit. As a result we obta<strong>in</strong>ed a build<strong>in</strong>g block – the multiplier for application <strong>in</strong><br />

cryptographic and cryptanalytic systems. For the multiplier it is possible to choose<br />

a range of occupied physical area, computational time and size of operands.<br />

The second area we deal with is a generation of random numbers <strong>in</strong> digital<br />

environment of <strong>in</strong>tegrated circuits. A random number generator (RNG) is the only<br />

cryptographic element for which there are no generally applied algorithms. The ma<strong>in</strong><br />

reason for this is <strong>in</strong> the fact that harvest<strong>in</strong>g mechanism of RNG is tightly related to<br />

a target platform. Physical sources of randomness are very limited <strong>in</strong> digital devices.<br />

In addition, we deal with problematic issue of randomness test<strong>in</strong>g. The chosen design<br />

of RNG we analyse under chang<strong>in</strong>g temperature of a chip. F<strong>in</strong>ally, the proposed<br />

stochastic model of generator allows better understand<strong>in</strong>g of its pr<strong>in</strong>ciple.<br />

Abstract <strong>in</strong> Slovak<br />

V dizertačnej práci sa zaoberáme dvoma elementárnymi blokmi pouˇzívan´ymi v<br />

kryptografick´ych systémoch s verejn´ym kl’účom – prv´ym je násobička pre operácie s<br />

vel’k´ymi číslami, druh´ym je generátor náhodn´ych čísel. Oba bloky sú realizované v<br />

technológii hradlov´ych polí (obvody typu FPGA), čo umoˇzňuje vytvorenie prototypu<br />

vo vel’mi krátkom čase.<br />

Naˇsim hlavn´ym ciel’om v prípade násobičky je realizácia l’ahko parametrizova-<br />

tel’ného a ˇskálovatel’ného rieˇsenia, ktoré umoˇzňuje prispôsobenie architektúry podl’a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!