DocumentCode
1922909
Title
Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application
Author
Chia-Long Wu ; Chen-Hao Hu
fYear
2012
fDate
26-28 Sept. 2012
Firstpage
307
Lastpage
311
Abstract
We know the "signed-digit recoding algorithm" has less occurrence probability of the nonzero digit than original binary number representation. The goal of study time-efficient and space-efficient algorithms for modular arithmetic comes from the applications in modern cryptography, such as RSA cryptography and El-Gamal cryptography. Taking the RSA cryptography for example, the public and private keys are functions of a pair of prime numbers, and the encryption and decryption operations are accomplished by modular exponentiation. Fast modular exponentiation algorithms are often considered of practical significance in RSA cryptosystem. By using the technique of recording the common parts in the folded sub strings can improve the efficiency of the binary algorithm, thus can effective reduce the computational complexity of modular exponentiation.
Keywords
computational complexity; cryptography; probability; El-Gamal cryptography; RSA cryptography; computational complexity theoretical analysis; computer security application; cryptographic algorithms; fast modular exponentiation algorithms; modern cryptography; modular arithmetic; private keys; probability; public keys; signed-digit recoding algorithm; Algorithm design and analysis; Computational complexity; Computers; Hardware; Public key cryptography; RSA cryptosystem; algorithm; cryptography; exponentiation; number theory;
fLanguage
English
Publisher
ieee
Conference_Titel
Innovations in Bio-Inspired Computing and Applications (IBICA), 2012 Third International Conference on
Conference_Location
Kaohsiung
Print_ISBN
978-1-4673-2838-8
Type
conf
DOI
10.1109/IBICA.2012.9
Filename
6337683
Link To Document