Browse > Article
http://dx.doi.org/10.6109/JKIICE.2008.12.1.65

Design of an Efficient MAC Unit for RSA Cryptoprocessors  

Moon, Sang-Gook (목원대학교 정보전자영상공학부)
Abstract
RSA crypto-processors equipped with more than 1024 bits of key space handle the entire key stream in units of blocks. The RSA processor which will be the target design in this paper defines the length of the basic word as 128 bits, and uses an 256-bits register as the accumulator. For efficient execution of 128-bit multiplication, 32b${\times}$32b multiplier was designed and adopted and the results are stored in 8 separate 128-bit registers according to the status flag. In this paper, an efficient method to execute 128-bit MAC (multiplication and accumulation) operation is proposed. The suggested method pre-analyze the all possible cases so that the MAC unit can remove unnecessary calculations to speed up the execution. The proposed architecture prototype of the MAC unit was automatically synthesized, and successfully operated at 20MHz, which will be the operation frequency in the target RSA processor.
Keywords
MAC; RSA; multiplication; microprocessor;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. L. Montgomery, 'Modular multiplication without trial division,' Math. Comput., 44, pp. 519-521, 1985   DOI
2 J. L. Hennessy and D. A. Patterson, 'Computer Architecture : A Quantiative Approach, 3rd edition', Morgan Kaufmann Publishers, CA, 2003
3 A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC press, 1997
4 Douglas R. Stinson, Cryptography Theory and Practice 2nd Edition (c) 2002 by Chapman & Hall/CRC
5 R. L. Rivest, A. Shamir, and L. M. Adleman, 'A Method for Obtaining Digital Signatures and Public-key Cryptosystems,' Communications of the ACM, Vol. 21, pp. 120-126, Feb. 1978   DOI   ScienceOn
6 서광석, 김용태, 임종인, 김창한, 수론과 암호학, 경문사, 1998
7 William Stallings, Cryptography and network security principles and practice, 3rd Edition, (c) 003 by Pearson Education, In
8 T. Izu and B. Moller, 'Improved Parallel Elliptic Curve Multiplication Method Resistant against Side Channel Attacks', LNCS 2551, pp.296-313, 2002
9 김철, 암호학의 이해, 영풍문고, 1996