Font Size: a A A

Long-bit Wide Modular Multiplier Design

Posted on:2009-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y B YanFull Text:PDF
GTID:2208360272489581Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Internet was based on the open protocol like HTTP, TCP/IP, MIME, FTP etc. Due to the simple protocol structure, Internet becomes more and more popular nowadays. It has penetrated into the main fields of people's common life and national security system. But they are still not good for Internet system' s security and protection. There are many network attacks when we communicate through network, and the attacks will damage the information system seriously, so network security technology has become an important research topic for many governments and organizations. The appearance of public-key cryptography algorithm is to resolve some Internet security problems.Among the various public key cryptosystem, RSA algorithm is the best choice in both theory and application, and it is often used in digital signature and identification system. Designing low complexity and high speed RSA digital circuit becomes more attractive with the use of micro-electronic chip design technology.In this essay, the basic concepts of cryptogram including number theory and modular arithmetic are introduced. It is the base of knowing the RSA cryptosystem well. RSA system principle and algorithm used in the encrypt and decrypt process are analyzed, especially parallel modified Montgomery modular multiplication algorithm, and the proven of the new algorithm is given. The full system' s design and partition is achieved. The modules of shift add multiplier , the shift add and compare modular subtracter etc. have been detailed based on system partition.By employing the Top-Down design method and Bottom-Up test method 32bit parallel modular multiplier is implemented in this design. Moreover, the circuit is described in VerilogHDL on RTL level. The simulation and synthesis with EDA tools are completed, and the factual circuit and net lists are also acquired in this essay.
Keywords/Search Tags:public-key cryptography algorithm, RSA cryptosystem, Modular multiplication, Montgomery modular multiplication algorithm, Parallel Montgomery modular multiplication algorithm
PDF Full Text Request
Related items