Parallel RSA encryption based on tree architecture

Parallelism is a technique to accelerate various applications. Nowadays, parallel operations are used to solve computer problems such as sort, search, and cryptography, which result in a reasonable speed. Sequential algorithms can be parallelized by being implemented on parallel architectures. Cryptography is the science of hiding information, which by the increase in the applications on insecure communication environments, has become one of the most important aspects of the digital world. In this article, we propose a parallel RSA utilizing parallel processing on RSA using tree architecture. RSA is a well-known public key cryptography which is not as fast as symmetric cryptographies. Parallelizing it, we can achieve speedup and more security. We also investigate the state of the art methods of RSA and figure out that their low speed can be faster with reasonable security using parallel architecture.

[1]  Nadia Nedjah,et al.  M-ary parallel modular exponentiation: Software vs. hardware , 2010, 2010 15th CSI International Symposium on Computer Architecture and Digital Systems.

[2]  David Taniar,et al.  Parallel algorithms for selection query processing involving index in parallel database systems , 2004, Comput. Syst. Sci. Eng..

[3]  Manfred Glesner,et al.  Design of a reconfigurable AES encryption/decryption engine for mobile terminals , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[4]  Tom Chen,et al.  Design and implementation , 2006, IEEE Commun. Mag..

[5]  A. Jalali,et al.  An Improved Exponentiation Algorithm for RSA Cryptosystem , 2009, 2009 International Conference on Research Challenges in Computer Science.

[6]  Thongpon Teerakanok,et al.  Accelerating asymmetric-key cryptography using Parallel-key Cryptographic Algorithm (PCA) , 2009, 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[7]  P. L. Montgomery Modular multiplication without trial division , 1985 .

[8]  Ammar Belatreche,et al.  Fast architectures for FPGA-based implementation of RSA encryption algorithm , 2004, Proceedings. 2004 IEEE International Conference on Field- Programmable Technology (IEEE Cat. No.04EX921).

[9]  Adam J. Elbirt Understanding and Applying Cryptography and Data Security , 2009 .

[10]  Eric Peeters,et al.  Parallel FPGA implementation of RSA with residue number systems - can side-channel threats be avoided? , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[11]  Xudong Chen,et al.  Parallelization of RSA Algorithm Based on Compute Unified Device Architecture , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[12]  Yu-Hao Chang,et al.  A Study on Parallel RSA Factorization , 2009, J. Comput..

[13]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[14]  Qing Liu,et al.  Design and implementation of an improved RSA algorithm , 2010, 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT).

[15]  A. R. Ramli,et al.  Implementation and evaluation of new cryptography algorithm for e-mail applications , 2009 .

[16]  Debasis Das,et al.  A Parallel Encryption Algorithm for Block Ciphers Based on Reversible Programmable Cellular Automata , 2010, ArXiv.

[17]  Qiang Liu,et al.  A regular parallel RSA processor , 2004, The 2004 47th Midwest Symposium on Circuits and Systems, 2004. MWSCAS '04..

[18]  Poonsri Vate-U-Lan An Invitation Method Enhance Internet-Based Survey Response Rates , 2006 .

[19]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[20]  Nigel P. Smart,et al.  Cryptography: An Introduction , 2004 .

[21]  N. Shaikh-Husin,et al.  FPGA implementation of RSA public-key cryptographic coprocessor , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).

[22]  John Viega,et al.  Network Security with OpenSSL , 2002 .

[23]  Jilin Zhang,et al.  OpenMP compiler for distributed memory architectures , 2010, Science China Information Sciences.

[24]  Ding Nan,et al.  The Parallelization Design of Chaotic Encryption System Based on Mulit-level Shuffle-Exchange Network , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[25]  Dragos Trinca,et al.  Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[26]  Ali Ziya Alkar,et al.  A hardware version of the RSA using the Montgomery's algorithm with systolic arrays , 2004, Integr..

[27]  Akira Hayashi,et al.  A new fast modular multiplication method and its application to modular exponentiation‐based cryptography , 2000 .

[28]  Abdul Rahman Ramli,et al.  A parallel XTS encryption mode of operation , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).

[29]  Simon W. Moore,et al.  Hardware-Software Codesign of a Vector Co-processor for Public Key Cryptography , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).

[30]  A. Samsudin,et al.  Current State of Sequential Cryptography and Its Future Direction in Parallel System , 2008, 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies.

[31]  Chia-Long Wu,et al.  Fast Parallel Montgomery Binary Exponentiation Algorithm Using Canonical- Signed-Digit Recoding Technique , 2009, ICA3PP.

[32]  Nitin Rakesh,et al.  k-k sorting on the Multi Mesh of Trees , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[33]  Himanshu Thapliyal,et al.  VLSI implementation of RSA encryption system using ancient Indian Vedic mathematics , 2005, SPIE Microtechnologies.

[34]  Ling Feng,et al.  Preparations for encrypted XML metadata querying , 2004, Comput. Syst. Sci. Eng..

[35]  Qing Liu,et al.  On the design and implementation of an efficient RSA variant , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[36]  Wlodzimierz Bielecki,et al.  Parallelization Method of Encryption Algorithms , 2007, Advances in Information Processing and Protection.

[37]  David Pointcheval,et al.  Parallel authentication and public-key encryption , 2003 .

[38]  Hung-Yu Chien Extending RSA cryptosystems to proxy multi‐signature scheme allowing parallel individual signing operation , 2006 .

[39]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .