Abstract
This paper implements a 1024-bit RSA encryption/decryption system based on Zedboard, a product of Xilinx. It adopts some improved algorithms included limiting the intermediate product of multiplication and Chinese Remained Theorem(CRT) to improve the computing efficiency. It mainly optimizes the structure of system to satisfy the limited resource of Zedboard through the hardware-software codesign which makes the resource used effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Su, F., Hwang, T.: Comments on iterative modular multiplication without magnitude comparison. In: Proceedings of the 6th National Conference on Information Security, pp. 21–22 (1996)
Chen, C.Y., Liu, T.C.: A fast modular multiplication method based on the lempel–ziv binary tree. Comput. Commun. 22(9), 871–874 (1999)
Kaur, G., Arora, V.: An efficient implementation of RSA algorithm using FPGA and big prime digit. IJCCER 1(4), 100–103 (2013)
Sahu, S.K., Pradhan, M.: FPGA implementation of RSA encryption system. Int. J. Comput. Appl. 19(9), 10–12 (2011)
Anand, A., Praveen, P.: Implementation of RSA algorithm on FPGA. Int. J. Eng. Res. Technol. 1(5) (2012)
Ito, Y., Nakano, K., Bo, S.: The parallel FDFM processor core approach for CRT-based RSA decryption. Int. J. Netw. Comput. 2(1), 79–96 (2012)
Christofi, M., Chetali, B., Goubin, L.: Formal verification of an implementation of CRT-RSA vigilants algorithm. In: PROOFS Workshop: Pre-proceedings, p. 28 (2013)
Attili, S., Jain, S., Mitra, S.: PS and PL ethernet performance and jumbo frame support with PL ethernet in the Zynq-7000 AP SoC (2013)
Rao, G.R.C., Lakshmi, P., Shankar, N.R.: A new modular multiplication method in public key cryptosystem. IJ Netw. Secur. 15(1), 23–27 (2013)
Sutter, G.D., Deschamps, J., Imaña, J.L.: Modular multiplication and exponentiation architectures for fast RSA cryptosystem based on digit serial computation. IEEE Trans. Ind. Electron. 58(7), 3101–3109 (2011)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2010)
Quisquater, J.J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)
Kim, C., Ha, J.C., Kim, S.-H., Kim, S., Yen, S.-M., Moon, S.-J.: A secure and practical CRT-based RSA to resist side channel attacks. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 150–158. Springer, Heidelberg (2004)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Nedjah, N., Mourelle, L.M.: Three hardware architectures for the binary modular exponentiation: sequential, parallel, and systolic. IEEE Trans. Circuits Syst. I: Regul. Pap. 53(3), 627–633 (2006)
Takagi, N., Yajima, S.: Modular multiplication hardware algorithms with a redundant representation and their application to RSA cryptosystem. IEEE Trans. Comput. 41(7), 887–891 (1992)
Lu, J., Jiang, Z., Ma, M.: Embedded System Hardware and Software Co-design Practical Guide based on XilinxZynq. China Machine Press, Beijing (2013)
Wu, C.H., Hong, J.H., Wu, C.W.: RSA cryptosystem design based on the chinese remainder theorem. In: Proceedings of the 2001 Asia and South Pacific Design Automation Conference, pp. 391–395. ACM (2001)
Acknowledgment
This study is supported by the Special Pilot Research of the Chinese Academy of Sciences (Grant No. XDA06030200).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bai, X., Jiang, L., Liu, X., Tan, J. (2015). RSA Encryption/Decryption Implementation Based on Zedboard. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)