E N D
The efficiency of a particular cryptographic scheme based on any one of the algebraic structures will depend on a number of factors, such as parameter size, time-memory tradeoffs, processing power available, software and/or hardware optimization, and mathematical algorithms. This lecture is concerned primarily with mathematical algorithms for efficiently carrying out computations in the underlying algebraic structure.
The algorithms described in this lecture are those which, for the most part, have received considerable attention in the literature. Although some attempt is made to point out their relative merits, no detailed comparisons are given.
Outline • Prime Number Issue • Exponentiation • Exponent Recoding • Multi-Exponentiation • Chinese Remainder Theorem for RSA • Montgomery Reduction Method
1.2 Prime Number Generation Prime number generation differs from primality testing as before, but may and typically does involve the latter. The former allows the construction of candidates of a fixed form which may lead to more efficient testing than possible for random candidates.
2.1 Problem Model 2.1.1 Addition Chains
2.1.3 Addition Sequences and Vector Addition Chains (Continued)
2.1.3 Addition Sequences and Vector Addition Chains (Continued)
2.2 Techniques for General Exponentiation 2.2.1 The Binary Method
2.3 Fixed-Exponent Exponentiation Algorithms There are numerous situations in which a number of exponentiations by a fixed exponent must be performed. Examples include RSA encryption and decryption, and ElGamal decryption.