1,964 research outputs found

    EMBEDDING RESIDUE ARITHMETIC INTO MODULAR MULTIPLICATION FOR INTEGERS AND POLYNOMIALS

    Get PDF
    A brand new methodology for embedding residue arithmetic inside a dual-field Montgomery modular multiplication formula for integers in as well as for polynomials was presented within this project. A design methodology for incorporating Residue Number System (RNS) and Polynomial Residue Number System (PRNS) in Montgomery modular multiplication in GF (p) or GF (2n) correspondingly, in addition to VLSI architecture of the dual-field residue arithmetic Montgomery multiplier are presented within this paper. In cryptographic applications to engender the public and private keys we suffer from the arithmetic operations like advisement, subtraction and multiplication. An analysis of input/output conversions to/from residue representation, combined with the suggested residue Montgomery multiplication formula, reveals prevalent multiply-accumulate data pathways both between your converters and backward and forward residue representations

    Realizing arbitrary-precision modular multiplication with a fixed-precision multiplier datapath

    Get PDF
    Within the context of cryptographic hardware, the term scalability refers to the ability to process operands of any size, regardless of the precision of the underlying data path or registers. In this paper we present a simple yet effective technique for increasing the scalability of a fixed-precision Montgomery multiplier. Our idea is to extend the datapath of a Montgomery multiplier in such a way that it can also perform an ordinary multiplication of two n-bit operands (without modular reduction), yielding a 2n-bit result. This conventional (nxn->2n)-bit multiplication is then used as a “sub-routine” to realize arbitrary-precision Montgomery multiplication according to standard software algorithms such as Coarsely Integrated Operand Scanning (CIOS). We show that performing a 2n-bit modular multiplication on an n-bit multiplier can be done in 5n clock cycles, whereby we assume that the n-bit modular multiplication takes n cycles. Extending a Montgomery multiplier for this extra functionality requires just some minor modifications of the datapath and entails a slight increase in silicon area

    A versatile Montgomery multiplier architecture with characteristic three support

    Get PDF
    We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2n), GF(3m), and GF(p). Our unified design supports RSA and elliptic curve schemes, as well as the identity-based encryption which requires a pairing computation on an elliptic curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical unified architectures is only good for addition and multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for a transformation between the redundant and the non-redundant representations of field elements, which would be required in the classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of the unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88%, while the improvement over a classical unified architecture is at least 32.07%

    Self-dual modules of semisimple Hopf algebras

    Get PDF
    We prove that, over an algebraically closed field of characteristic zero, a semisimple Hopf algebra that has a nontrivial self-dual simple module must have even dimension. This generalizes a classical result of W. Burnside. As an application, we show under the same assumptions that a semisimple Hopf algebra that has a simple module of even dimension must itself have even dimension.Comment: 9 pages. Important new result included. See also http://www.mathematik.uni-muenchen.de/~sommer

    Efficient NTRU Implementations

    Get PDF
    In this paper, new software and hardware designs for the NTRU Public Key Cryptosystem are proposed. The first design attempts to improve NTRU\u27s polynomial multiplication through applying techniques from the Chinese Remainder Theorem (CRT) to the convolution algorithm. Although the application of CRT shows promise for the creation of the inverse polynomials in the setup procedure, it does not provide any benefits to the procedures that are critical to the performance of NTRU (public key creation, encryption, and decryption). This research has identified that this is due to the small coefficients of one of the operands, which can be a common misunderstanding. The second design focuses on improving the performance of the polynomial multiplications within NTRU\u27s key creation, encryption, and decryption procedures through hardware. This design exploits the inherent parallelism within a polynomial multiplication to make scalability possible. The advantage scalability provides is that it allows the user to customize the design for low and high power applications. In addition, the support for arbitrary precision allows the user to meet the desired security level. The third design utilizes the Montgomery Multiplication algorithm to develop an unified architecture that can perform a modular multiplication for GF(p) and GF(2^k) and a polynomial multiplication for NTRU. The unified design only requires an additional 10 gates in order for the Montgomery Multiplier core to compute the polynomial multiplication for NTRU. However, this added support for NTRU presents some restrictions on the supported lengths of the moduli and on the chosen value for the residue for the GF(p) and GF(2^k) cases. Despite these restrictions, this unified architecture is now capable of supporting public key operations for the majority of Public-Key Cryptosystems

    On Higher Frobenius-Schur Indicators

    Full text link
    We study the higher Frobenius-Schur indicators of modules over semisimple Hopf algebras, and relate them to other invariants as the exponent, the order, and the index. We prove various divisibility and integrality results for these invariants. In particular, we prove a version of Cauchy's theorem for semisimple Hopf algebras. Furthermore, we give some examples that illustrate the general theory.Comment: 62 pages. Important new result added, remark by P. Etingof included, mistake in last section corrected. See also http://www.mathematik.uni-muenchen.de/~sommer
    corecore