Generation of Addition Chain using Deterministic Division Based Method
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 5
Abstract
Efficiency of a cryptosystem depends not only on the security it provides, but also it increases the operational speed thereby it reduces the time taken for encryption and decryption. In most numbertheoretic cryptographic algorithms like RSA, ElGamal, Massey-Omura etc., the encryption and decryption functions often involve raising large elements (xe mod n) of group fields GF(2n) or large powers (exponents). If they are not properly implemented, they increase the operational time which ultimately lead to customer dissatisfaction. Thus, group exponentiation has received much attention by the researchers in recent times owing to their central role in modern cryptography and it is effectively computed using the concept of addition chain. Several deterministic and stochastic algorithms have been proposed in literature to generate the shortest addition chains. Normally, stochastic algorithms produce the optimal addition chains but it is not obtained from the single run which is a time consuming process. Thus, a deterministic algorithm has been proposed which is simply based on division in this paper and it is compared with other deterministic and stochastic algorithms.
Authors and Affiliations
Mr. K. Mani
A Survey on Administrative Policies in Rule- Based Access Control
Administrative controls contains the official written policies, rules, events and standards. It form the outline for running the organization and handling people. The Rule-Based access control defines detailed circumstan...
A Novel Technique for Image Compression in Hand Written Recognition using Back Propagation in Neural Network
The handwritten symbol recognition plays an important role in present communication systems. In the data communication systems, all the data have to be recorded, encoded and will be communicated with other systems. Prese...
Methodology and Analysis for Various SQL Injection Techniques
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...
A REVIEW: Advancement in Single node data transfer energy protocol in WSN
Wireless sensor network (WSNs) gains the importance in both research and actual user. Energy saving is the major issue that is common in both. Now day maximum work in research field on the multiple hops data transmission...
COMPREHENSIVE STUDY AND COMPARISON OF INFORMATION DISPERSAL TECHNIQUES FOR CLOUD COMPUTING
Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention...