Back close

An efficient hardware model for RSA encryption system using Vedic mathematics

Publication Type : Conference Paper

Publisher : Procedia Engineering

Source : Procedia Engineering, Volume 30, Coimbatore, p.124-128 (2012)

Url :

Keywords : Algorithms, Communication, Computation speed, Cryptography, Data network, Decryption algorithm, Encryption system, Encryption technique, Encryption/decryption, Hardware models, Network security, One step, Partial product, Prime number, Privacy and security, Private-key, Public keys, RSA algorithms, RSA encryption, RSA encryption system, Standard algorithms, Systems analysis, Vedic Mathematics

Campus : Bengaluru

School : School of Engineering

Department : Electronics and Communication

Year : 2012

Abstract : The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. One of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where a is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used and also an improvement is made in the conventional restoring algorithm which does the modulus operation. Urdhva- tiryakbhyam is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. Also an improvement is made in the restoring algorithm by avoiding unnecessary restorations when they are not required.

Cite this Research Publication : R. Bhaskar, Hegde, G., and Vaya, P. R., “An efficient hardware model for RSA encryption system using Vedic mathematics”, in Procedia Engineering, Coimbatore, 2012, vol. 30, pp. 124-128.

Admissions Apply Now