3,598 research outputs found
Analysis of Parallel Montgomery Multiplication in CUDA
For a given level of security, elliptic curve cryptography (ECC) offers improved efficiency over classic public key implementations. Point multiplication is the most common operation in ECC and, consequently, any significant improvement in perfor- mance will likely require accelerating point multiplication. In ECC, the Montgomery algorithm is widely used for point multiplication. The primary purpose of this project is to implement and analyze a parallel implementation of the Montgomery algorithm as it is used in ECC. Specifically, the performance of CPU-based Montgomery multiplication and a GPU-based implementation in CUDA are compared
A Talk on Quantum Cryptography, or How Alice Outwits Eve
Alice and Bob wish to communicate without the archvillainess Eve
eavesdropping on their conversation. Alice, decides to take two college
courses, one in cryptography, the other in quantum mechanics. During the
courses, she discovers she can use what she has just learned to devise a
cryptographic communication system that automatically detects whether or not
Eve is up to her villainous eavesdropping. Some of the topics discussed are
Heisenberg's Uncertainty Principle, the Vernam cipher, the BB84 and B92
cryptographic protocols. The talk ends with a discussion of some of Eve's
possible eavesdropping strategies, opaque eavesdropping, translucent
eavesdropping, and translucent eavesdropping with entanglement.Comment: 31 pages, 8 figures. Revised version of a paper published in "Coding
Theory, and Cryptography: From Geheimscheimschreiber and Enigma to Quantum
Theory," (edited by David Joyner), Springer-Verlag, 1999 (pp. 144-174). To be
published with the permission of Springer-Verlag in an AMS PSAPM Short Course
volume entitled "Quantum Computation.
A Low-Cost Unified Experimental FPGA Board for Cryptography Applications
This paper describes the evaluation of available
experimental boards, the comparison of their supported set
of experiments and other aspects. The second part of this
evaluation is focused on the design process of the PCB (Printed
Circuit Board) for an FPGA (Field Programmable Gate Array)
based cryptography environment suitable for evaluating the latest
trends in the IC (Integrated Circuit) security like Side–Channel
Attacks (SCA) or Physically Unclonable Function (PUF). It
leads to many criteria affecting the design process and also the
suitability for evaluating and measuring results of the attacks and
their countermeasures. The developed system should be open,
versatile and unrestricted by the U.S. law [1]
- …