Generation of Addition Chain using Deterministic Division Based Method
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 5
Abstract
Efficiency of a cryptosystem depends not only on the security it provides, but also it increases the operational speed thereby it reduces the time taken for encryption and decryption. In most numbertheoretic cryptographic algorithms like RSA, ElGamal, Massey-Omura etc., the encryption and decryption functions often involve raising large elements (xe mod n) of group fields GF(2n) or large powers (exponents). If they are not properly implemented, they increase the operational time which ultimately lead to customer dissatisfaction. Thus, group exponentiation has received much attention by the researchers in recent times owing to their central role in modern cryptography and it is effectively computed using the concept of addition chain. Several deterministic and stochastic algorithms have been proposed in literature to generate the shortest addition chains. Normally, stochastic algorithms produce the optimal addition chains but it is not obtained from the single run which is a time consuming process. Thus, a deterministic algorithm has been proposed which is simply based on division in this paper and it is compared with other deterministic and stochastic algorithms.
Authors and Affiliations
Mr. K. Mani
Animal Health Observation by Using Query Processing Based On Fuzzy Logic in Wireless Sensor Network
Wireless Sensor Networks (WSNs) query processing based on fuzzy logic provides specifications of the desired data of common natural language, eliminate the custom of threshold values the same as predicates. The query of...
Merge Technique for Automated Reconstruction of Large Image
This paper present an automated reconstruction high level architectural specification of image merging for satellite image capturing system, aiming at implementing a real-time satellite image processing system for mergin...
A Secure data sharing approach for dynamic groups in cloud with multi owners
Cloud computing provides an easy solution for sharing group resource among cloud users. In a multi owner manner data preserving and privacy identity from untrusted cloud is still an exigent issue. In this Paper we are go...
A comparative study of fuzzy logic and weighted Association rule mining in frequent datasets
Mining of frequent patterns in transaction databases has been a fashionable area of research. Many methods are being used to solve the trouble of discovering association rules among items in large databases [8]. Transact...
An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks
Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...