Beruflich Dokumente
Kultur Dokumente
•
•
25
Sort By:
Select All | Deselect All
The RSA algorithm proposed by Rivest, Shamir and Adleman as a public key cryptosystem is
used in different communication networks in order to ensure data confidentiality. Different
weaknesses of this algorithm could be observed and many attacks against it are developed
successfully. Improving this algorithm was performed in this paper in order to ensure a higher
data security and an increased computing process speed. We propose an optimized encryption
method which may be associated with the RSA key generation mechanism. The proposed
method is based on a detailed analysis of the algebraic finite fields (AFF). The improved
algorithm can be implemented on new generation networks (second generation networks and so
on) and applies to wireless networks with Bluetooth devices which need an increased security by
enlargement of the utilization area. In the same time, we have used a maximum acceptable
length encryption key and algorithm complexity, which increases the computing speed and
security degree, but allows the processor to work properly. Read More»
This paper presents a real-time data encryption/decryption subsystem developed for a satellite,
which is planned to be launched in 2007 by TUBITAK-BILTEN. The subsystem GOLGE contains
two ASICs, which perform encryption/decryption using AES (Advanced Encryption Standard) and
RSA (Rivest-Shamir-Adleman) algorithms and a communication interface unit. The
data/command interface of the GOLGE module is implemented on a reconfigurable ASIC (FPGA),
where the encryption/decryption processors have previously been designed in TUBITAK-BILTEN
and prototyped in ANTIS 0.35-μm CMOS technology. The system uses an 8-bit bidirectional data
bus, which operates at a maximum frequency of 40 MHz supplying a throughput of 160 Mbit/sec
and a SpaceWire interface, which provides a 100 Mbit/sec serial data communication link. Read
More»
The letter proposes new identity-based identification and signature schemes which are more
efficient than the Fiat-Shamir scheme (1986) from the standpoint of transmitted message length
and secret information size stored in a smart card, and are about one order of magnitude faster
than the RSA scheme (R.L. Rivest et al., 1977) Read More»
Since the time of Caesar, cryptography has been used in the design of secure communications
systems. Recently, Diffie and Hellman [2] have introduced a new type of cryptographic method,
based on "trapdoor" functions, which promises to be of great value in the design of such
systems. We present a review of public key cryptosystems, followed by examples of
communications systems which make particularly elegant use of their properties. Read More»
An appraisal is given of the current status, both technical and nontechnical, of cryptologic
research. The principal concepts of both secret-key and public-key cryptography are described.
C.E. Shanon's theory of secrecy (1949) and G.J. Simon's theory authenticity (1984) are reviewed
for the insight that they give into practical cryptographic systems. Public-key concepts are
illustrated through consideration of the Diffie-Hellman public-key-distribution system and the
Rivest-Shamir-Adleman public-key cryptosystem. The subtleties of cryptographic protocols are
shown through consideration of some such specific protocols Read More»
In this paper we present a hardware implementation of the RSA algorithm for public-key
cryptography. Basically, the RSA algorithm entails a modular exponentiation operation on large
integers, which is considerably time-consuming to implement. To this end, we adopted a novel
algorithm combining the Montgomery's technique and the carry-save representation of numbers.
A highly modular, bit-slice based architecture has been designed for executing the algorithm in
hardware. We also propose an FPGA-based implementation of the architecture developed. The
characteristics of the algorithm, the regularity of the architecture, and the data-flow aware
placement of the FPGA resources resulted in a considerable performance improvement, as
compared to other implementations presented in the literature. Read More»
A single-chip system capable of encryption using the Rivest, Shamir, and Adleman algorithm at
rates significantly higher than other implementations is reported. The chip uses a self-timed
methodology and has been implemented in a 2 μm technology. The chip is a complete system
and includes registers for the storage of keys for duplex operation. It is provided with a standard
interface to a number of common microprocessors Read More»