资源描述:
《A Reconfigurable Modular Arithmetic Unit for Public-key 》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、AReconfigurableModularArithmeticUnitforPublic-keyCryptography*TaoChen,BinYu,Jin-HaiSu,Zi-binDai,Jian-GuoLiuInstituteofElectronicTechnology,thePLAInformationEngineeringUniversity,Zhengzhou450004,P.R.China*Email:chentaoic@yahoo.com.cnAbstractnon-removableparameters,
2、narrowapplicationandhighpriceofrepeateddesignetc.willbeintroducedbyThispaperanalyzesthereconfigurabledesignspecifichardwareimplementation.principlesofpublic-keycryptographyandtheInordertosatisfyvariousapplicationsecuritycharacteristicsofmodulararithmeticiterationp
3、rocess.demands,areconfigurablemodulararithmeticunitAccordingtotheanalysisresults,astructure-adaptive[4](RMAU),basedonreconfigurablecomputationidea,reconfigurablemodulararithmeticunitforPublic-keywasproposedforadaptingabroadtopublic-keycryptographyisimplemented,whi
4、charchitectureisablecryptographyinthispaper.TheRMAUcansatisfytosupportbothRSAandECC(Fp)algorithmssecuritysecurityparametersalterabledemandsofbothRSAandparametersdynamicarbitrarychanging.Basedon0.18ECC(F(p))algorithmswithbetterperformanceandinmicrometerstandardcell
5、-library,theareaofthechipis2smallerarea.only42000ȝmˊSimulationresultsofpost-synthesisindicatethatthemaximumoperatingclockfrequencyis103.8MHz,the1024-bitRSAmodularexponential2.Public-KeyCryptographyReconfigurableDesignoperationperiodisabout45ms,andthe192-bitECC(Fp)
6、PrinciplesResearchpointmultiplicationperiodis17msonaverage.AnalyzingtheoperationsinvolvedinRSAandKeywords:Public-keycryptography˗ReconfigurableECC(Fp)levelbylevel,wecanseethatthecommoncomputing˗Modulararithmetic˗RSA˗ECC˗operationsofpublic-keycryptographyalgorithms
7、canbedividedintothreelevelsfromfunction:application1.Introductionoperationlayer,extendedoperationlayerandbasicoperationlayer.Public-keycryptographyiswidelyusedinprovidingApplicationoperationlayerincludesatleast4kindsofprivacy,integralityandnon-repudiationofinforma
8、tion.cryptographicapplicationoperations:primenumberfilter,Public-keycryptographyisdisunityinvarioussecurity[1]keygeneration,digitalsignatureandidentityc