Skip to main content

Bit Forwarding Techniques for Efficient Modular Exponentiation

  • Chapter
  • First Online:
Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

Abstract

This chapter discusses the better performing approaches for modular exponential techniques that are adaptable by the different architectures of PKC. The importance of PKC in the field of information security including militarily level security is decisive. The security of these PKCs depends upon their complex arithmetic problems (e.g. IFP and DLP) which include modular exponentiation as a critical operation. Modular exponentiation is an expensive operation, that is comprised of a series of modular multiplications. The overall performance of PKC is affected by the efficient implementation of modular exponentiation. There are different ways of improving the performance of modular exponentiation, either reduce the modular multiplication operation’s internal architecture to reduce the latency, or reduce the number of modular multiplications required for the computation of modular exponentiation. This chapter discusses the techniques of reducing the number of the required modular multiplications by Bit Forwarding (BFW) techniques and how they can be implemented. The Montgomery multiplication algorithm is modified according to the requirements of BFW techniques. There are two varieties of Montgomery multiplication discussed:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bar-El H (2002) Security implications of hardware vs. software cryptographic modules. Discretix White Paper

    Google Scholar 

  • Batina L, Ă–rs SB, Preneel B, Vandewalle J (2003) Hardware architectures for public key cryptography. Integr VLSI J 34(1):1–64

    Article  Google Scholar 

  • Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  • ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Advances in cryptology. Springer, pp 10–18

    Google Scholar 

  • Koç ÇK (1995) Analysis of sliding window techniques for exponentiation. Comput Math Appl 30(10):17–24

    Article  MathSciNet  Google Scholar 

  • Montgomery PL (1985) Modular multiplication without trial division. Math Comput 44(170):519–521

    Article  MathSciNet  Google Scholar 

  • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  Google Scholar 

  • Stallings W (2003) Network security essentials: applications and standards, 4/e. Pearson Education India

    Google Scholar 

  • Vollala S, Ramasubramanian N (2017) Energy efficient modular exponentiation for public-key cryptography based on bit forwarding techniques. Inf Process Lett 119:25–38

    Article  MathSciNet  Google Scholar 

  • Vollala S, Geetha K, Ramasubramanian N (2016) Efficient modular exponential algorithms compatible with hardware implementation of public-key cryptography. Sec Commun Netw 9(16):3105–3115

    Article  Google Scholar 

  • Vollala S, Tiwari U, Amin R (2019) A metric reckon algorithm for bit forwarding techniques. In: 2019 IEEE international symposium on smart electronic systems (iSES)(Formerly iNiS). IEEE, pp 21–24

    Google Scholar 

  • Vollala S, Varadhan V, Geetha K, Ramasubramanian N (2014) Efficient modular multiplication algorithms for public key cryptography. In: 2014 IEEE international advance computing conference (IACC). IEEE, pp 74–78

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satyanarayana Vollala .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Vollala, S., Ramasubramanian, N., Tiwari, U. (2021). Bit Forwarding Techniques for Efficient Modular Exponentiation. In: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-030-74524-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74524-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-74523-3

  • Online ISBN: 978-3-030-74524-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics