Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/256106
Title: Optimization of Montgomery multiplication algorithm for public key cryptography
Researcher: Narmadha G
Guide(s): Balasubadra K
Keywords: Cryptography
Engineering and Technology,Computer Science,Computer Science Information Systems
Montgomery Multiplication
University: Anna University
Completed Date: 2018
Abstract: Information security is the essential need of the today s digital world. Cryptography process is used to provide high information security when a data is transferred between transmitter and receiver. Private key and public key cryptography are the two types of cryptography which are classified based on the key distribution among the sender and receiver. In private key cryptography, sender and receiver will use the same key for encrypting and decrypting the message. Therefore, the key which is used for encryption and decryption should be known only to the corresponding users newlineand also it should be transferred among the users only through the secured communication path. Otherwise the data can be misused by the hackers. To overcome this drawback of key distribution problem, public key cryptography is introduced by Diffie and Hellman in 1976 and it is also the most widely used cryptographic technique. In public key cryptography, two different keys are used for encryption and decryption. So the secured communication channel is not necessary and the possibility of data hacking is less. Various techniques such as RSA, ECC, Digital Signature Algorithm and ElGamal cryptosystems are followed to perform the cryptographic functions and all the techniques require the modular exponentiation function. In previous years, modular exponentiation is done by using the trial division method but it incurs high area and time consumption. Peter L. Montgomery introduced the Montgomery algorithm in 1985 and it replaces the trial division method thereby reduces the area and time consumption. Montgomery multiplication newlinealgorithm is used to obtain the modular exponentiation by using the modular multiplication. Addition is the basic function for performing modular multiplication and hence the adders play a vital role in Montgomery multiplication algorithm. Different adder structures are used and analyzed to choose the suitable adder for performing modular multiplication. newline newline newline
Pagination: xvii, 109p.
URI: http://hdl.handle.net/10603/256106
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File22.84 kBAdobe PDFView/Open
02_certificates.pdf688.16 kBAdobe PDFView/Open
03_abstract.pdf5.89 kBAdobe PDFView/Open
04_acknowledgement.pdf4.41 kBAdobe PDFView/Open
05_table of contents.pdf19.98 kBAdobe PDFView/Open
06_list_of_abbreviations.pdf5.37 kBAdobe PDFView/Open
07_chapter1.pdf55.39 kBAdobe PDFView/Open
08_chapter2.pdf84.64 kBAdobe PDFView/Open
09_chapter3.pdf355.22 kBAdobe PDFView/Open
10_chapter4.pdf160.65 kBAdobe PDFView/Open
11_chapter5.pdf664.59 kBAdobe PDFView/Open
12_conclusion.pdf14.03 kBAdobe PDFView/Open
13_references.pdf19.24 kBAdobe PDFView/Open
14_list_of_publications.pdf9.48 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: