An efficient Montgomery exponentiation algorithm for public-key cryptosystems

Chia Long Wu*, Der Chyuan Lou, Te Jen Chang

*Corresponding author for this work

Research output: Contribution to conferenceConference Paperpeer-review

6 Scopus citations

Abstract

The well-know binary method is a generally acceptable method for modular exponentiation in public-key cryptosystems. In this paper, we propose a new binary exponentiation algorithm, which is based on common-multiplicand method, Montgomery modular reduction algorithm, signed-digit recoding technique, and binary exponentiation algorithm. The common-multiplicand technique is developed to solve the problem common-multiplicand multiplications, i.e., the same common part in two modular multiplications can be computed once rather twice. The "signed-digit recoding" has less occurrence probability of the nonzero digit than binary representation. Due to this advantage, we can efficiently lower down the amount of modular multiplications and we can therefore decrease the computational complexity of modular exponentiation. By using the proposed algorithm, the total number of multiplications can be reduced by about 66.7% as compared with the original Montgomery modular reduction algorithm.

Original languageEnglish
Pages284-285
Number of pages2
DOIs
StatePublished - 2008
Externally publishedYes
EventIEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008 - Taipei, Taiwan
Duration: 17 06 200820 06 2008

Conference

ConferenceIEEE International Conference on Intelligence and Security Informatics, 2008, IEEE ISI 2008
Country/TerritoryTaiwan
CityTaipei
Period17/06/0820/06/08

Keywords

  • Common-multiplicand multiplication
  • Cryptography
  • Public-key cryptosystem
  • Signed-digit recoding

Fingerprint

Dive into the research topics of 'An efficient Montgomery exponentiation algorithm for public-key cryptosystems'. Together they form a unique fingerprint.

Cite this