Hardware implementation of a Montgomery modular multiplier in a systolic array

Siddika Berna Örs, Lejla Batina, Bart Preneel, Joos Vandewalle

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

46 Citations (Scopus)

Abstract

This paper describes a hardware architecture for modular multiplication operation which is efficient for bit-lengths suitable for both commonly used types of public key cryptography (PKC) i.e. ECC and RSA cryptosystems. The challenge of current PKC implementations is to deal with long numbers (160-2048 bits) in order to achieve system's efficiency, as well as security. RSA, still the most popular PKC, has at its root the modular exponentiation operation. Modular exponentiation consists of repeated modular multiplications, which is also the basic operation for ECC protocols. The solution proposed in this work uses a systolic array implementation and can be used for arbitrary precisions. We also present modular exponentiation based on Montgomery's Multiplication Method (MMM).

Original languageEnglish
Title of host publicationProceedings - International Parallel and Distributed Processing Symposium, IPDPS 2003
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)0769519261, 9780769519265
DOIs
Publication statusPublished - 2003
Externally publishedYes
EventInternational Parallel and Distributed Processing Symposium, IPDPS 2003 - Nice, France
Duration: 22 Apr 200326 Apr 2003

Publication series

NameProceedings - International Parallel and Distributed Processing Symposium, IPDPS 2003

Conference

ConferenceInternational Parallel and Distributed Processing Symposium, IPDPS 2003
Country/TerritoryFrance
CityNice
Period22/04/0326/04/03

Bibliographical note

Publisher Copyright:
© 2003 IEEE.

Keywords

  • ECC
  • FPGA
  • Montgomery's Multiplication Method
  • Public Key Cryptography
  • RSA
  • Systolic array

Fingerprint

Dive into the research topics of 'Hardware implementation of a Montgomery modular multiplier in a systolic array'. Together they form a unique fingerprint.

Cite this