Design of a Super-ffigh'-Speed RSA Encryption Processor Based on the Residue Table for Redundant Binary Numbers
Project/Area Number |
12650453
|
Research Category |
Grant-in-Aid for Scientific Research (C)
|
Allocation Type | Single-year Grants |
Section | 一般 |
Research Field |
Control engineering
|
Research Institution | Hacbinohe Institute of Technology |
Principal Investigator |
TOMABECHI Nobuhiro Hacbinohe Institute of Technology, Faculty of Engineering, Professor, 工学部, 教授 (70048180)
|
Project Period (FY) |
2000 – 2001
|
Project Status |
Completed (Fiscal Year 2001)
|
Budget Amount *help |
¥1,800,000 (Direct Cost: ¥1,800,000)
Fiscal Year 2001: ¥700,000 (Direct Cost: ¥700,000)
Fiscal Year 2000: ¥1,100,000 (Direct Cost: ¥1,100,000)
|
Keywords | RSA cryptsystem / high-speed / Dprocessor / redundant binary number / residue table / design |
Research Abstract |
(1) Detailed Design of the Encryption Processor The RSA encryption processor with following features is designed. 【encircled 1】All the arithmetic operations are performed in the form of the redundant binary arithmetic. 【encircled 2】Residue calculation is performed by table-look-up where the table is built in the hardware of the processor. Following results are obtained. 【encircled 1】The operation speed is about 3 Mbits/sec when the key length, N is 1024 bits. 【encircled 2】The speed is almost 60 times that of the conventional processors. ^ 【encircled 3】The order of the operation speed is O(NlogN). The order of the conventional processors is O(N^2). 【encircled 4】The chip size is (4.3 x 10^5λ)x(5,63 x 10^5λ), where λ denotes the standard size in the layout design. (2) Defect-Tolerance Design of the Processor The following method is presented. 【encircled 1】The targeted system is designed in the bit-slice form, and a bit-slice is taken as the unit block for redundancy. 【encircled 2】Redundant blocks are uniformly distributed among the non-redundant blocks. 【encircled 3】The function of me defective block is stopped and is sifted to the neighboring block. (3) Pipelined Design of the Processor All the partial products in the multiplier circuit are totaled using the combination of the binary tree structure with the array structure of the redundant binary adders. By the introduction pf the pipelining, fee encryption speed is greatly enhanced when the plaintext data is continuously input and the timing design becomes easy.
|
Report
(3 results)
Research Products
(13 results)