Programs
- M. Tech. in Automotive Engineering -
- Clinical Fellowship in Laboratory Genetics & Genomics - Fellowship
Publication Type : Conference Paper
Publisher : Procedia Engineering
Source : Procedia Engineering, Volume 30, Coimbatore, p.124-128 (2012)
Keywords : Algorithms, Communication, Computation speed, Cryptography, Data network, Decryption algorithm, Encryption system, Encryption technique, Encryption/decryption, Hardware models, Network security, One step, Partial product, Prime number, Privacy and security, Private-key, Public keys, RSA algorithms, RSA encryption, RSA encryption system, Standard algorithms, Systems analysis, Vedic Mathematics
Campus : Bengaluru
School : School of Engineering
Department : Electronics and Communication
Year : 2012
Abstract : The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. One of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where a is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used and also an improvement is made in the conventional restoring algorithm which does the modulus operation. Urdhva- tiryakbhyam is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. Also an improvement is made in the restoring algorithm by avoiding unnecessary restorations when they are not required.
Cite this Research Publication : R. Bhaskar, Hegde, G., and Vaya, P. R., “An efficient hardware model for RSA encryption system using Vedic mathematics”, in Procedia Engineering, Coimbatore, 2012, vol. 30, pp. 124-128.