oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption  [cached]
Yasuaki Ito,Koji Nakano,Song Bo
International Journal of Networking and Computing , 2012,
Abstract: One of the key points of success in high performance computation using an FPGA is the efficient usage of DSP slices and block RAMs in it. This paper presents a FDFM (Few DSP slices and Few block RAMs) processor core approach for implementing RSA encryption. In our approach, an efficient hardware algorithm for Chinese Remainder Theorem (CRT) based RSA decryption using Montgomery multiplication algorithm is implemented. Our hardware algorithm supporting up-to 2048-bit RSA decryption is designed to be implemented using one DSP slice, one block RAM and few logic blocks in the Xilinx Virtex-6 FPGA. The implementation results show that our RSA core for 1024-bit RSA decryption runs in 13.74ms. Quite surprisingly, the multiplier in the DSP slice used to compute Montgomery multiplication works in more than 95% clock cycles during the processing. Hence, our implementation is close to optimal in the sense that it has only less than 5% overhead in multiplication and no further improvement is possible as long as CRT-based Montgomery multiplication based algorithm is applied. We have also succeeded in implementing 320 RSA decryption cores in one Xilinx Virtex-6 FPGA XC6VLX240T-1 which work in parallel. The implemented parallel 320 RSA cores achieve 23.03 Mbits/s throughput for 1024-bit RSA decryption.
A Fast Implementation of RSA Algorithm by DSP
RSA算法的一种DSP快速实现

LIU Liang,HU Bing,XU Hai-bo,LIN Jin-qiang,XIANG Ji,JING Ji-wu,
刘亮
,胡冰,徐海波,林璟锵,向继,荆继武

计算机应用研究 , 2005,
Abstract: Select a fast modular exponentiation algorithm according to the feature of DSP, so hosts resources are saved and further more the speed of modular exponentiation operation is accelerated. On the other hand, the scheme splits the private key to make it unaccessible to the outside thus the security of the implementation of RSA algorithm is enhanced.
Improvement in RSA Cryptosystem  [cached]
Seema Verma,Deepak Garg
Journal of Advances in Information Technology , 2011, DOI: 10.4304/jait.2.3.146-151
Abstract: Boneh and Shacham gave a nice survey on four variants (Batch RSA, MultiPrime RSA, MultiPower RSA, Rebalanced RSA). Rebalanced RSA and MultiPower RSA were then combined to increase the decryption/signature generation performance. This combination theoretically improves the decryption/signature generation time about 14 times than RSA with CRT and about 56 times than the standard RSA with key size 2048bits. On the encryption side, it increased the encryption time, thus making encryption/signature verification very costly. Here in this paper we further tried to increase the encryption/signature verification performance. The proposed scheme is semantically secure also.
Dual-Layer Video Encryption using RSA Algorithm  [PDF]
Aman Chadha,Sushmit Mallik,Ankit Chadha,Ravdeep Johar,M. Mani Roja
Computer Science , 2015, DOI: 10.5120/20302-2341
Abstract: This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.
On the Efficiency of Fast RSA Variants in Modern Mobile Phones  [PDF]
Klaus Hansen,Troels Larsen,Kim Olsen
Computer Science , 2010,
Abstract: Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public key cryptosystem RSA. It is, however, well known that public key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, MultiPrime RSA, MultiPower RSA, Rebalanced RSA and R Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.
Application of Dual Port RAM in Communication System between DSP and Interferometer
双口RAM在DSP与红外干涉仪通信系统中的应用

HUANG Ye,FANG Yong-hua,XIONG Wei,Dong Da-ming,
黄烨
,方勇华,熊伟,董大明

红外 , 2006,
Abstract: A design method of dual-port RAM used in the interface between Digital Signal Processors (DSP) and an interferometer is presented, in order to enable the DSP to communicate with the interferometer at a high speed. The principle and operation rule of the IDT7024 are described. According to the design, the interface circuit and flow chart are also presented. Finally, three methods are proposed to prevent the conflict of two systems according to the arbitrated access to the data exchanged between both sides.
On the Efficiency of Fast RSA Variants in Modern Mobile Phones
Klaus Hansen,Troels Larsen,Kim Olsen
International Journal of Computer Science and Information Security , 2009,
Abstract: Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on modern mobile phones. In this paper, we explore the efficiency on modern mobile phones of variants of the RSA cryptosystem, covering CRT, Multi-Prime RSA, Multi-Power RSA, Rebalanced RSA and R-Prime RSA by comparing the encryption and decryption time using a simple Java implementation and a typical RSA setup.Keywords—Public-key cryptography; RSA; software; mobile phones;
Application of Dual-Port RAM to the Communication Between the ARM and DSP
双端口RAM 在ARM 与DSP 通信系统中的应用

LIU Yu-Zhen,ZHANG Ye,
刘玉珍
,张晔

计算机系统应用 , 2011,
Abstract: The high-speed and real-time communication has been realized between the ARM and TMS320C6211 DSP through the use of IDT70261 dual-port RAM,giving the hardware connection diagram between the TMS320C6211 and ARM which is connected by dual-port RAM and the driver details of ARM.
Robust RSA for Digital Signature
Virendra Kumar,Puran Krishen Koul
International Journal of Computer Science Issues , 2011,
Abstract: The RSA cryptosystem is currently used in a wide variety of products, platforms, and industries around the world. It is found in many commercial software products and is planned to be in many more. In hardware, the RSA algorithm can be found in secure telephones, on ethernet network cards, and on smart cards.It offers encryption and digital signatures (authentication). In this paper we will illustrate the application and problem associated with RSA Algorithm.
A Comparative Study of Public Key Cryptosystem based on ECC and RSA
Arun kumar,,Dr. S.S. Tyagi,,Manisha Rana,,Neha Aggarwal
International Journal on Computer Science and Engineering , 2011,
Abstract: The paper gives an introduction to the public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The main emphasize is on some public key algorithms such as RSA and ECC along with the idea how ECC is better and more securemethod of encryption in comparison to RSA and other asymmetric cryptosystems.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.