• DocumentCode
    1922909
  • Title

    Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Application

  • Author

    Chia-Long Wu ; Chen-Hao Hu

  • fYear
    2012
  • fDate
    26-28 Sept. 2012
  • Firstpage
    307
  • Lastpage
    311
  • Abstract
    We know the "signed-digit recoding algorithm" has less occurrence probability of the nonzero digit than original binary number representation. The goal of study time-efficient and space-efficient algorithms for modular arithmetic comes from the applications in modern cryptography, such as RSA cryptography and El-Gamal cryptography. Taking the RSA cryptography for example, the public and private keys are functions of a pair of prime numbers, and the encryption and decryption operations are accomplished by modular exponentiation. Fast modular exponentiation algorithms are often considered of practical significance in RSA cryptosystem. By using the technique of recording the common parts in the folded sub strings can improve the efficiency of the binary algorithm, thus can effective reduce the computational complexity of modular exponentiation.
  • Keywords
    computational complexity; cryptography; probability; El-Gamal cryptography; RSA cryptography; computational complexity theoretical analysis; computer security application; cryptographic algorithms; fast modular exponentiation algorithms; modern cryptography; modular arithmetic; private keys; probability; public keys; signed-digit recoding algorithm; Algorithm design and analysis; Computational complexity; Computers; Hardware; Public key cryptography; RSA cryptosystem; algorithm; cryptography; exponentiation; number theory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Innovations in Bio-Inspired Computing and Applications (IBICA), 2012 Third International Conference on
  • Conference_Location
    Kaohsiung
  • Print_ISBN
    978-1-4673-2838-8
  • Type

    conf

  • DOI
    10.1109/IBICA.2012.9
  • Filename
    6337683