Title :
Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application
Author :
Chia-Long Wu ; Chen-Hao Hu
Abstract :
We know the "signed-digit recoding algorithm" has less occurrence probability of the nonzero digit than original binary number representation. The goal of study time-efficient and space-efficient algorithms for modular arithmetic comes from the applications in modern cryptography, such as RSA cryptography and El-Gamal cryptography. Taking the RSA cryptography for example, the public and private keys are functions of a pair of prime numbers, and the encryption and decryption operations are accomplished by modular exponentiation. Fast modular exponentiation algorithms are often considered of practical significance in RSA cryptosystem. By using the technique of recording the common parts in the folded sub strings can improve the efficiency of the binary algorithm, thus can effective reduce the computational complexity of modular exponentiation.
Keywords :
computational complexity; cryptography; probability; El-Gamal cryptography; RSA cryptography; computational complexity theoretical analysis; computer security application; cryptographic algorithms; fast modular exponentiation algorithms; modern cryptography; modular arithmetic; private keys; probability; public keys; signed-digit recoding algorithm; Algorithm design and analysis; Computational complexity; Computers; Hardware; Public key cryptography; RSA cryptosystem; algorithm; cryptography; exponentiation; number theory;
Conference_Titel :
Innovations in Bio-Inspired Computing and Applications (IBICA), 2012 Third International Conference on
Conference_Location :
Kaohsiung
Print_ISBN :
978-1-4673-2838-8
DOI :
10.1109/IBICA.2012.9