Generation of Addition Chain using Deterministic Division Based Method
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 5
Abstract
Efficiency of a cryptosystem depends not only on the security it provides, but also it increases the operational speed thereby it reduces the time taken for encryption and decryption. In most numbertheoretic cryptographic algorithms like RSA, ElGamal, Massey-Omura etc., the encryption and decryption functions often involve raising large elements (xe mod n) of group fields GF(2n) or large powers (exponents). If they are not properly implemented, they increase the operational time which ultimately lead to customer dissatisfaction. Thus, group exponentiation has received much attention by the researchers in recent times owing to their central role in modern cryptography and it is effectively computed using the concept of addition chain. Several deterministic and stochastic algorithms have been proposed in literature to generate the shortest addition chains. Normally, stochastic algorithms produce the optimal addition chains but it is not obtained from the single run which is a time consuming process. Thus, a deterministic algorithm has been proposed which is simply based on division in this paper and it is compared with other deterministic and stochastic algorithms.
Authors and Affiliations
Mr. K. Mani
Shortest Path Geographic Routing for Mobile Ad Hoc Networks
Mobile Ad-hoc Network (MANET) is a Network in which contains nodes that are dynamic, which means their positions are not fixed or they are can move. Since the positions are not fixed they do not have a permanent infrastr...
An Improved Montgomery’s Method Over Public-Key Cryptosystem
This paper deals with improving Montgomery’s algorithm. We improve mongomery’s algorithm such that modular multiplications can be executed two times faster. Each iteration in our algorithm requires only one addition, whi...
QoS and Energy Consumption by Symmetric and Asymmetric key Schemes against Blackhole attack in Wireless Sensor Network
The Wireless Sensor Network consists of a number of spatial distributed sensor devices that combines with each other to accomplish a task of environment monitoring, object tracking, etc. and report the gathered data to a...
Performance analysis of AODV &GPSR routing protocol in VANET
VANET (Vehicular Ad Hoc Network) is an emerging technology to achieve intelligent inter vehicle communications, it is the specialized derivation of pure multi hop ad hoc networking and are already going through industria...
Benefits of Learning Management System (LMS) in Indian Education
In today’s scenario, academic institutions are striving to find the right combination of students, faculties, protocols and systems to manage their learning programs. Learning management systems (LMS) are becoming an int...