An Improved Montgomery’s Method Over Public-Key Cryptosystem

Abstract

This paper deals with improving Montgomery’s algorithm. We improve mongomery’s algorithm such that modular multiplications can be executed two times faster. Each iteration in our algorithm requires only one addition, while that in Montgomery’s requires two additions. We then propose a cellular array to implement modular exponentiation for the Rivest–Shamir–Adleman cryptosystem. It has approximately 2n cells, where n is the word length. The cell contains one full-adder and some controlling logic. The time to calculate a modular exponentiation is about 2n2 clock cycles.

Authors and Affiliations

GVS Raj Kumar , Lagadapati Maanasa , K. Naveen Kumar , P. Chandra Sekhar , Mahesh Kasula

Keywords

Related Articles

LOCK-FREE FIFO BASED PARALLEL HTB IN CLOUD COMPUTING

Cloud computing is becoming more and more popular in IT industry nowadays. Those famous companies including Amazon, IBM, HP, Google and Microsoft are creating and deploying Clouds in various locations around the world. T...

Z-U-T-S SHAPED STRUCTURES IN AN INTEGRATED CPW FED PRINTED MONOPOLE ANTENNA

A dual band co-planar waveguide fed Z-U-T-S shaped monopole antenna is proposed. The antenna is fabricated on an h = 1.6mm FR4 epoxy substrate with dielectric constant εr = 4.3 and loss tangent tan δ = 0.008. The size of...

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the...

ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION

Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...

INVISIBLE MULTIPLE WATERMARKING WITH MINIMUM DISTORTION USING DWT-DCT-CDMA

with the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of wa...

Download PDF file
  • EP ID EP140492
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

GVS Raj Kumar, Lagadapati Maanasa, K. Naveen Kumar, P. Chandra Sekhar, Mahesh Kasula (2011). An Improved Montgomery’s Method Over Public-Key Cryptosystem. International Journal of Computer Science & Engineering Technology, 2(1), 12-19. https://europub.co.uk/articles/-A-140492