An Improved Montgomery’s Method Over Public-Key Cryptosystem
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2011, Vol 2, Issue 1
Abstract
This paper deals with improving Montgomery’s algorithm. We improve mongomery’s algorithm such that modular multiplications can be executed two times faster. Each iteration in our algorithm requires only one addition, while that in Montgomery’s requires two additions. We then propose a cellular array to implement modular exponentiation for the Rivest–Shamir–Adleman cryptosystem. It has approximately 2n cells, where n is the word length. The cell contains one full-adder and some controlling logic. The time to calculate a modular exponentiation is about 2n2 clock cycles.
Authors and Affiliations
GVS Raj Kumar , Lagadapati Maanasa , K. Naveen Kumar , P. Chandra Sekhar , Mahesh Kasula
LOCK-FREE FIFO BASED PARALLEL HTB IN CLOUD COMPUTING
Cloud computing is becoming more and more popular in IT industry nowadays. Those famous companies including Amazon, IBM, HP, Google and Microsoft are creating and deploying Clouds in various locations around the world. T...
Z-U-T-S SHAPED STRUCTURES IN AN INTEGRATED CPW FED PRINTED MONOPOLE ANTENNA
A dual band co-planar waveguide fed Z-U-T-S shaped monopole antenna is proposed. The antenna is fabricated on an h = 1.6mm FR4 epoxy substrate with dielectric constant εr = 4.3 and loss tangent tan δ = 0.008. The size of...
ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK
A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the...
ACCESSING DISTRIBUTED SERVICES WITH ONE TIME TOKEN GENERATION
Many services which we use today require us to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In th...
INVISIBLE MULTIPLE WATERMARKING WITH MINIMUM DISTORTION USING DWT-DCT-CDMA
with the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of wa...