Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

PIPELINE MULTIPLIER OF POLYNOMIALS MODULO WITH ANALYSIS OF HIGH-ORDER BITS OF THE MULTIPLIER

View through CrossRef
Among public-key cryptosystems, cryptosystems built on the basis of a polynomial system of residual classes are special. Because in these systems, arithmetic operations are performed at high speed. There are many algorithms for encrypting and decrypting data presented in the form of polynomials. The paper considers data encryption based on the multiplication of polynomials modulo irreducible polynomials. In such a multiplier, the binary image of a multiply polynomial can serve as a fragment of encrypted text. The binary image of the multiplier polynomial is the secret key and the binary representation of the irreducible polynomial is the module. Existing sequential polynomial multipliers and single-cycle matrix polynomial multipliers modulo do not provide the speed required by the encryption block. The paper considers the possibility of multiplying polynomials modulo on a Pipeline in which architectural techniques are laid in order to increase computing performance. In the conclusion of the work, the time gain of the multiplication modulo is shown by the example of the multiplication of five triples of polynomials. Verilog language was used to describe the scheme of the Pipeline multiplier. Used FPGA Artix-7 from Xilinx companies. The developed Pipeline multiplier can be used for cryptosystems based on a polynomial system of residual classes, which can be implemented in hardware or software.
Title: PIPELINE MULTIPLIER OF POLYNOMIALS MODULO WITH ANALYSIS OF HIGH-ORDER BITS OF THE MULTIPLIER
Description:
Among public-key cryptosystems, cryptosystems built on the basis of a polynomial system of residual classes are special.
Because in these systems, arithmetic operations are performed at high speed.
There are many algorithms for encrypting and decrypting data presented in the form of polynomials.
The paper considers data encryption based on the multiplication of polynomials modulo irreducible polynomials.
In such a multiplier, the binary image of a multiply polynomial can serve as a fragment of encrypted text.
The binary image of the multiplier polynomial is the secret key and the binary representation of the irreducible polynomial is the module.
Existing sequential polynomial multipliers and single-cycle matrix polynomial multipliers modulo do not provide the speed required by the encryption block.
The paper considers the possibility of multiplying polynomials modulo on a Pipeline in which architectural techniques are laid in order to increase computing performance.
In the conclusion of the work, the time gain of the multiplication modulo is shown by the example of the multiplication of five triples of polynomials.
Verilog language was used to describe the scheme of the Pipeline multiplier.
Used FPGA Artix-7 from Xilinx companies.
The developed Pipeline multiplier can be used for cryptosystems based on a polynomial system of residual classes, which can be implemented in hardware or software.

Related Results

Installation Analysis of Matterhorn Pipeline Replacement
Installation Analysis of Matterhorn Pipeline Replacement
Abstract The paper describes the installation analysis for the Matterhorn field pipeline replacement, located in water depths between 800-ft to 1200-ft in the Gul...
A Fluid-pipe-soil Approach to Stability Design of Submarine Pipelines
A Fluid-pipe-soil Approach to Stability Design of Submarine Pipelines
Abstract The conventional approach to submarine pipeline stability design considers interactions between water and pipeline (fluid-pipe) and pipeline and seabed (...
Pipeline Resistance
Pipeline Resistance
Pipeline resistance is where an often abstract and wonky climate movement meets the bravery and boldness of Indigenous and other frontline defenders of land and water who inspire d...
Pushing the Limits: One Bit, One Section South Iraq Deep Well Case Study
Pushing the Limits: One Bit, One Section South Iraq Deep Well Case Study
Abstract Cost and operation effective selection of drilling Bits to drill the HPHT Wells sections in Block-09 field in one run with optimum parameters. ...
Truncated-Exponential-Based Appell-Type Changhee Polynomials
Truncated-Exponential-Based Appell-Type Changhee Polynomials
The truncated exponential polynomials em(x) (1), their extensions, and certain newly-introduced polynomials which combine the truncated exponential polynomials with other known pol...
Seismic Vulnerability of the Subsea Pipeline
Seismic Vulnerability of the Subsea Pipeline
Abstract Unburied marine pipeline vulnerability under seismic impact, a new approach of investigation, and conclusion / recommendations for certain analyzed cases...
Dewatering And Commissioning The Uk Central Area Transmission System (CATS) Pipeline
Dewatering And Commissioning The Uk Central Area Transmission System (CATS) Pipeline
ABSTRACT A monoethylene glycol swabbing technique was used to successfully dewater the 36" diameter, 410 kilometer, Central Area Transmission System (CATS) gas pi...

Back to Top