An efficient hardware model for RSA Encryption system using Vedic mathematics

The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Eve...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Procedia engineering Jg. 30; S. 124 - 128
Hauptverfasser: Bhaskar, R., Hegde, Ganapathi, Vaya, P.R.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier Ltd 2012
Schlagworte:
ISSN:1877-7058, 1877-7058
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. One of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where “a” is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used and also an improvement is made in the conventional restoring algorithm which does the modulus operation. “Urdhva-tiryakbhyam” is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. Also an improvement is made in the restoring algorithm by avoiding unnecessary restorations when they are not required.
AbstractList The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. One of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where “a” is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used and also an improvement is made in the conventional restoring algorithm which does the modulus operation. “Urdhva-tiryakbhyam” is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. Also an improvement is made in the restoring algorithm by avoiding unnecessary restorations when they are not required.
Author Vaya, P.R.
Hegde, Ganapathi
Bhaskar, R.
Author_xml – sequence: 1
  givenname: R.
  surname: Bhaskar
  fullname: Bhaskar, R.
– sequence: 2
  givenname: Ganapathi
  surname: Hegde
  fullname: Hegde, Ganapathi
– sequence: 3
  givenname: P.R.
  surname: Vaya
  fullname: Vaya, P.R.
  email: bhaskar767@gmail.com
BookMark eNqFkM1KAzEQgINUsNa-gYe8wK5JdrM_HoRSahUqgn_XkE0mbUo3W5Ko9O3dpR7Eg85hZmD4hpnvHI1c5wChS0pSSmhxtU33vgO3ThmhLCU0rXJ2gsa0KsukJLwa_ejP0DSELRmiJIzTMXqYOQzGWGXBRbyRXn9KD7jtNOyw6Tx-ep7hhVP-sI-2czgcQoQWvwfr1vgNtFW4lXEDfbIqXKBTI3cBpt91gl5vFy_zu2T1uLyfz1aJyjiLia5JwzXT2lBiGs2I5gXNCpCM1bLOSNkPOK-kaepca12QqskylnPDgCtKIJug6-Ne5bsQPBihbJTDgdFLuxOUiMGN2IqjGzG4EYSK3k0P57_gvbet9If_sJsjBv1jHxa8CIM01TvwoKLQnf17wRckz4Mp
CitedBy_id crossref_primary_10_1051_matecconf_20166501005
crossref_primary_10_1108_IJCED_04_2023_0032
Cites_doi 10.1145/359340.359342
ContentType Journal Article
Copyright 2012
Copyright_xml – notice: 2012
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.proeng.2012.01.842
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1877-7058
EndPage 128
ExternalDocumentID 10_1016_j_proeng_2012_01_842
S1877705812008521
GroupedDBID --K
0R~
0SF
1B1
4.4
457
5VS
6I.
71M
AACTN
AAEDT
AAEDW
AAFTH
AAFWJ
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
ADMUD
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
E3Z
EBS
EJD
EP3
FDB
FEDTE
FNPLU
HVGLF
HZ~
IXB
KQ8
M41
M~E
NCXOZ
O-L
O9-
OK1
OZT
P2P
RIG
ROL
SES
SSZ
XH2
9DU
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEUPX
AFPUW
AIGII
AKBMS
AKRWK
AKYEP
CITATION
~HD
ID FETCH-LOGICAL-c352t-d90b5d2ddf10fbd20d56136ea229a9307df1558afb94ddd608b33245f2e5c10e3
ISICitedReferencesCount 10
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000314170600016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1877-7058
IngestDate Sat Nov 29 03:38:01 EST 2025
Tue Nov 18 22:32:04 EST 2025
Fri Feb 23 02:27:21 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Vedic mathematics
improved restoring algorithm
RSA encryption system
Language English
License http://creativecommons.org/licenses/by-nc-nd/3.0
https://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c352t-d90b5d2ddf10fbd20d56136ea229a9307df1558afb94ddd608b33245f2e5c10e3
OpenAccessLink https://dx.doi.org/10.1016/j.proeng.2012.01.842
PageCount 5
ParticipantIDs crossref_citationtrail_10_1016_j_proeng_2012_01_842
crossref_primary_10_1016_j_proeng_2012_01_842
elsevier_sciencedirect_doi_10_1016_j_proeng_2012_01_842
PublicationCentury 2000
PublicationDate 2012
2012-00-00
PublicationDateYYYYMMDD 2012-01-01
PublicationDate_xml – year: 2012
  text: 2012
PublicationDecade 2010
PublicationTitle Procedia engineering
PublicationYear 2012
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Nitish Aggarwal, Kartik Asooja (bib0020) 2009
Behrouz A Forouzan, Debdeep Mukhopadhyay,”Cryptography and Network Security”, second edition, Tata McGraw Hill Education Pvt Ltd, 2008.
Shamim Akhter (bib0010) 2007
Rivest, Shamir, Adleman (bib0025) 1978; 21
Himanshu Thapliyal, Srinivas (bib0015) 2004
Himanshu Thapliyal and M.B. Srinivas, “VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics”, Center for VLSI and Embedded System Technologies, International Institute of Information Technology Hyderabad-500019, India.
Sumit Vaidya, Deepak Dandekar (bib0035) 2010
Shamim Akhter (10.1016/j.proeng.2012.01.842_bib0010) 2007
10.1016/j.proeng.2012.01.842_bib0030
Sumit Vaidya (10.1016/j.proeng.2012.01.842_bib0035) 2010
Nitish Aggarwal (10.1016/j.proeng.2012.01.842_bib0020) 2009
Rivest (10.1016/j.proeng.2012.01.842_bib0025) 1978; 21
10.1016/j.proeng.2012.01.842_bib0005
Himanshu Thapliyal (10.1016/j.proeng.2012.01.842_bib0015) 2004
References_xml – year: 2004
  ident: bib0015
  article-title: “High speed Efficient Hierarchial Overlay multiplier based on Ancient Indian Vedic mathematics”
  publication-title: proceedings of International Conference on Signal Processing ICSP 2004, Turkey
– volume: 21
  start-page: 120
  year: 1978
  end-page: 126
  ident: bib0025
  article-title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
  publication-title: Communications of the ACM
– reference: Himanshu Thapliyal and M.B. Srinivas, “VLSI Implementation of RSA Encryption System Using Ancient Indian Vedic Mathematics”, Center for VLSI and Embedded System Technologies, International Institute of Information Technology Hyderabad-500019, India.
– year: 2010
  ident: bib0035
  article-title: Delay-Power Performance Comparison of multipliers in VLSI circuit design
  publication-title: International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.4
– reference: Behrouz A Forouzan, Debdeep Mukhopadhyay,”Cryptography and Network Security”, second edition, Tata McGraw Hill Education Pvt Ltd, 2008.
– year: 2009
  ident: bib0020
  article-title: Saurabh Shekhar Verma, Sapna Negi, An Improvement in the Restoring Division Algorithm
  publication-title: IEEE
– year: 2007
  ident: bib0010
  article-title: “VHDL Implementation of Fast NXN Multiplier Based on Vedic Mathematics”, Jaypee Institute of Information Technology University, Noida
  publication-title: 201307 UP, INDIA IEEE
– volume: 21
  start-page: 120
  issue: 2
  year: 1978
  ident: 10.1016/j.proeng.2012.01.842_bib0025
  article-title: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
  publication-title: Communications of the ACM
  doi: 10.1145/359340.359342
– year: 2004
  ident: 10.1016/j.proeng.2012.01.842_bib0015
  article-title: “High speed Efficient Hierarchial Overlay multiplier based on Ancient Indian Vedic mathematics”
  publication-title: proceedings of International Conference on Signal Processing ICSP 2004, Turkey
– year: 2010
  ident: 10.1016/j.proeng.2012.01.842_bib0035
  article-title: Delay-Power Performance Comparison of multipliers in VLSI circuit design
  publication-title: International Journal of Computer Networks & Communications (IJCNC), Vol.2, No.4
– ident: 10.1016/j.proeng.2012.01.842_bib0005
– ident: 10.1016/j.proeng.2012.01.842_bib0030
– year: 2009
  ident: 10.1016/j.proeng.2012.01.842_bib0020
  article-title: Saurabh Shekhar Verma, Sapna Negi, An Improvement in the Restoring Division Algorithm
  publication-title: IEEE
– year: 2007
  ident: 10.1016/j.proeng.2012.01.842_bib0010
  article-title: “VHDL Implementation of Fast NXN Multiplier Based on Vedic Mathematics”, Jaypee Institute of Information Technology University, Noida
  publication-title: 201307 UP, INDIA IEEE
SSID ssj0000070251
Score 1.9765054
Snippet The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES)...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 124
SubjectTerms improved restoring algorithm
RSA encryption system
Vedic mathematics
Title An efficient hardware model for RSA Encryption system using Vedic mathematics
URI https://dx.doi.org/10.1016/j.proeng.2012.01.842
Volume 30
WOSCitedRecordID wos000314170600016&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1877-7058
  dateEnd: 20181231
  omitProxy: false
  ssIdentifier: ssj0000070251
  issn: 1877-7058
  databaseCode: M~E
  dateStart: 20090101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZQ4QAHxFOUAvKBW-RV7MSJfVyhApdWFS1Vb5Gd2NACodrd0vbCb2fGdpIVrXhJXKJdJ453PZ_G4_HMN4S8lA7sClty5k1VsLL2itnSF4xb4WH9kTXXNhSbqHd31dGR3kvx88tQTqDue3VxoU__q6ihDYSNqbN_Ie7xpdAAn0HocAWxw_WPBD_vMUjjOCQ6ZphTdY7BXaHiTYgpfLc_z7b7dnEZlUWkcs7Ogs_gEI9tsi8jlety3XYNOQUAp8xNHIbjbv6jWX5Ksdqzyb_6IZL6vjG9CaWPhzuH5jIYrXuz9HTyO_BpfzqmwkxxR6g5VV2zOo887DN3TVtSt-kYJupLHhOo09LLY574Fa0eHQwnuKbAP8R4PIFcqyrycv3El72Po-KgHEM7JJIM3BS11FjXY-f75IBDoiMRynOOP3NIrQzxf1cHu950WTNHDu6Ru2kfQedR_vfJDdc_IHfW2CUfkp15T0ck0AEJNCCBAhIoIIFOSKARCTQggQYk0DUkPCLvX28fvHrLUvUM1oJRvWKdzq3sRNd5nnvbibzDvWLljBDaaFDtcENKZbzVZdd1Va5sAda19MLJlueueEw2-q-9e0KoBxtal7JwLvelMqVVeBxv8spXSljnNkkxTEzTJmp5rHDyuRliCE-aOJ0NTmeT8wamc5OwsddppFb5zfP1MOdNMg-j2dcATn7Z8-k_99wit_Fb9Lk9IxurxZl7Tm6131bHy8WLAKgfkv2LBA
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+efficient+hardware+model+for+RSA+Encryption+system+using+Vedic+mathematics&rft.jtitle=Procedia+engineering&rft.au=Bhaskar%2C+R.&rft.au=Hegde%2C+Ganapathi&rft.au=Vaya%2C+P.R.&rft.date=2012&rft.pub=Elsevier+Ltd&rft.issn=1877-7058&rft.eissn=1877-7058&rft.volume=30&rft.spage=124&rft.epage=128&rft_id=info:doi/10.1016%2Fj.proeng.2012.01.842&rft.externalDocID=S1877705812008521
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-7058&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-7058&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-7058&client=summon