90
Views
8
CrossRef citations to date
0
Altmetric
Articles

A novel accelerated implementation of RSA using parallel processing

, , , &

References

  • Rivest, Ronald L., Adi Shamir, and Leonard Adleman. “A method for obtaining digital signatures and public-key cryptosystems.” Communications of the ACM 21.2: 120-126 (1978). doi: 10.1145/359340.359342
  • Fadhil, Heba Mohammed, and Mohammed Issam Younis. “Parallelising RSA algorithm on multicore CPU and GPU.” International Journal of Computer Applications 87.6 (2014).
  • Page, Dan, and Nigel P. Smart. “Parallel cryptographic arithmetic using a redundant Montgomery representation.” IEEE Transactions on Computers 53.11 : 1474-1482 (2004). doi: 10.1109/TC.2004.100
  • Fan, Wenjun, Xudong Chen, and Xuefeng Li. “Parallelisation of RSA algorithm based on compute unified device architecture.” Grid and Cooperative Computing (GCC), 2010 9th International Conference on. IEEE (2010).
  • Eberle, Hans, et al. “Accelerating next-generation public-key cryptosystems on general-purpose CPUs.” IEEE Micro 25.2 : 52-59 (2005). doi: 10.1109/MM.2005.24
  • Koc, C. Kaya, Tolga Acar, and Burton S. Kaliski. “Analyzing and comparing Montgomery multiplication algorithms.” IEEE micro 16.3 : 26-33 (1996). doi: 10.1109/40.502403
  • Fan, Junfeng, Kazuo Sakiyama, and Ingrid Verbauwhede. “Montgomery Modular Multiplication Algorithm on Multi-Core Systems.” SiPS. (2007).
  • Nozaki, Hanae, et al. “Implementation of RSA algorithm based on RNS Montgomery multiplication.” International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg (2001).
  • Cao, Ying-yu, and Chong Fu. “An efficient implementation of RSA digital signature algorithm.” Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. Vol. 2. IEEE (2008).
  • Cormen, Thomas H., et al. Introduction to Algorithms. MIT Press (2009)
  • Shahar Timnat “Practical Parallel Data Structures”. Distributed Computing: 30th International Symposium, DISC 2016, Paris
  • Blelloch, Guy E., and Bruce M. Maggs. “Parallel algorithms.” ACM Computing Surveys (CSUR) 28.1 : 51-54 (1996). doi: 10.1145/234313.234339
  • Aki, Selim G. “The design and analysis of parallel algorithms.” (1989). Osti.gov. 1 Nov 2018. https://www.osti.gov/biblio
  • Dai, Wei. “Crypto++ library.” https://www.cryptopp.com/ (2010).
  • Montgomery, Peter L. “Modular multiplication without trial division.” Mathematics of computation 44.170 : 519-521 (1985). doi: 10.1090/S0025-5718-1985-0777282-X
  • Nagendra, M., and M. Chandra Sekhar. “Performance improvement of Advanced Encryption Algorithm using parallel computation.” International Journal of Software Engineering and Its Applications 8.2 : 287-296. (2014)
  • Saxena, Sapna, and Bhanu Kapoor. “An efficient parallel algorithm for secured data communications using RSA public key cryptography method.” Advance Computing Conference (IACC), 2014 IEEE International. IEEE (2014).
  • Mahajan, Sonam, and Maninder Singh. “Analysis of RSA algorithm using GPU programming.” arXiv preprint arXiv: 1407.1465 (2014).
  • Yang, Yang, et al. “Accelerating RSA with fine-grained parallelism using GPU.” Information Security Practice and Experience. Springer, Cham, 454-468 2015.
  • Kunal Gagneja & John Singh, Survey and analysis of security issues on RSA algorithm for digital video data, Journal of Discrete Mathematical Sciences and Cryptography, 19:1, 39-55 (2016), DOI: 10.1080/09720529.2015.1085730
  • Hari Om & Shipra Kumari, Comment and modification of RSA based remote password authentication using smart card, Journal of Discrete Mathematical Sciences and Cryptography, 20:3, 625-635 (2017), DOI: 10.1080/09720529.2014.932130

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.