Publication Type:

Conference Paper


Procedia Engineering, Volume 30, Coimbatore, p.124-128 (2012)



Algorithms, Communication, Computation speed, Cryptography, Data network, Decryption algorithm, Encryption system, Encryption technique, Encryption/decryption, Hardware models, Network security, One step, Partial product, Prime number, Privacy and security, Private-key, Public keys, RSA algorithms, RSA encryption, RSA encryption system, Standard algorithms, Systems analysis, Vedic Mathematics


The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one of the safest standard algorithms, based on public-key, for providing security in networks. Even though the RSA Algorithm is an old and simple encryption technique, there is a scope to improve its performance. One of the most time consuming processes in RSA encryption/ decryption algorithm is the computation of ab mod n where "a" is the text, (b, n) is the key. Generally the prime number used for RSA Encryption system will around 100 to 150 decimal digits. The computations involved are tedious and time consuming. Also the hardware is quite complex. To increase the computation speed, the multiplication principle of Vedic mathematics is used and also an improvement is made in the conventional restoring algorithm which does the modulus operation. "Urdhva- tiryakbhyam" is the sutra (principle) which used to compute the multiplication. It literally means vertical and crosswise manipulation. The significance of this technique is that it computes the partial products in one step and avoids the shifting operation which saves both time and hardware. Also an improvement is made in the restoring algorithm by avoiding unnecessary restorations when they are not required.


cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@1cb67e26 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@1113ff84 Through org.apache.xalan.xsltc.dom.DOMAdapter@37ec3bde; Conference Code:89225

Cite this Research Publication

R. Bhaskar, Hegde, G., and Vaya, P. R., “An efficient hardware model for RSA encryption system using Vedic mathematics”, in Procedia Engineering, Coimbatore, 2012, vol. 30, pp. 124-128.