Parallel Point-Multiplication for Conic Curves Cryptosystem

Cryptosystem on conic curves, which is a new developing cryptography, becomes more widespread in these days. It is important to explore fast parallel algorithms to both encrypt and decrypt information in conic curves cryptosystem. Point-multiplication is the key operation for constructing security protocol in conic curves cryptosystem. There is no existing research focused on paralleling point-multiplication for conic curves cryptosystem. This paper presents parallel computation of point-multiplication for conic curves cryptosystem over finite field Fp and ring Zn. Research in this paper is based on our previous works about several parallel algorithms for conic curves cryptosystem. The parallel technique of point-multiplication is computing point-addition and point-double respectively. The performance evaluation demonstrates that our methodology could improve efficiency for conic curves cryptosystem over finite field Fp and ring Zn.

[1]  Huapeng Wu,et al.  Parallel scalar multiplication for elliptic curve cryptosystems , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[2]  Chunyan Han,et al.  A Parallel Encryption Algorithm for Color Images Based on Lorenz Chaotic Sequences , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[3]  Der-Chyuan Lou,et al.  Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem , 2006, Informatica.

[4]  Abdul Rahman Ramli,et al.  A parallel XTS encryption mode of operation , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).

[5]  Alexander Wong,et al.  AN EFFICIENT , PARALLEL MULTI-KEY ENCRYPTION OF COMPRESSED VIDEO STREAMS , 2006 .

[6]  Giorgio Di Natale,et al.  A Reliable Architecture for Parallel Implementations of the Advanced Encryption Standard , 2009, J. Electron. Test..

[7]  Mohamed Othman,et al.  Implementation of Parallel Algorithms for LUC Cryptosystem , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.

[8]  Miguel A. Vega-Rodríguez,et al.  A new methodology to implement the AES algorithm using partial and dynamic reconfiguration , 2010, Integr..

[9]  Li Tian,et al.  Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field Fp , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[10]  Zhigang Chen,et al.  A public-key cryptosystem scheme on conic curves over the ring Z n , 2006 .

[11]  Limin Xiao,et al.  Parallel Point-Addition and Point-Double for Cryptosystem on Conic Curves over Ring Zn , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[12]  H.M. Alaidaros,et al.  Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[13]  Sun Qi,et al.  The Conic Curves over Z_n and Public-Key Cryptosystem Protocol , 2005 .

[14]  Zhu Wen-yu,et al.  Public-key Cryptosystem Based on the Conic Curves over Z_n , 2005 .

[15]  Cao Zhenfu Conic analog of RSA cryptosystem and someimproved RSA cryptosystems , 1999 .

[16]  Zhigang Chen,et al.  A Public-Key Cryptosystem Scheme on Conic Curves over the Ring Zn , 2006 .

[17]  Hideki Imai,et al.  Parallel Key-Insulated Public Key Encryption , 2006, Public Key Cryptography.