TESTING OF PARALLEL CRYPTOGRAPHIC ALGORITHMS

Authors

DOI:

https://doi.org/10.20397/2177-6652/2022.v22i0.2374

Abstract

The article considered the algorithms of the constituent primitive operations of asymmetric algorithms for cryptographic data transformation, which can be implemented in parallel computing systems (FPGA, GPGPU, quantum computers etc.) to accelerate cryptographic transformations. As a basis for the implementation of cryptographic primitives, it is proposed to use non-positional number systems. In particular, the article considered the residual number system and proposes two new - frequency and coordinate number systems, based on Fourier and Tom-Cook interpolation bijective mappings over a ring of integers, as well as the implementation of addition, multiplication and division with a remainder in these systems for the implementation of modular arithmetic at finite algebraic structures. The analysis of the computational and spatial complexity of cryptographic algorithms in suggested number systems is presented. As a result, the advantages of non-positional number systems are shown in the implementation of asymmetric algorithms for asymmetric cryptographic data transformation in parallel computing systems.

References

Albrecht, M. B. (2016). A subfield lattice attack on overstretched NTRU assumptions. CRYPTO, 9814, 153-178. doi:https://doi.org/10.1007/978-3-662-53018-4_6

Bajard , J., & Imbert, I. (2004). A full RNS implementation of RSA. IEEE Transactions on Computers, 769-774.

Bi, S. &. (2008). The mixed-radix Chinese remainder theorem and its applications to residue comparison. IEEE Transactions on Computers, 1624-1632.

Divesh, A. (n.d.). Dimension-Preserving Reductions Between SVP and CVP in Different p-Norms. Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA). doi:https://doi.org/10.1137/1.9781611976465.145

EMVCo. (2011, November 29). Book 2: Security and Key Management. Version 4.3. Integrated Circuit Card Specifications for Payment Systems.

Farber, R. (2011). CUDA Application Design and Development. Burlington: Elsevier Science.

Fürer, M. (2007). Faster Integer Multiplication. Proceedings of the 39th annual ACM Symposium on Theory of Computing (STOC), 55-67.

Hartwig, M. (2016). ECDSA Security in Bitcoin and Ethereum: a Research Survey. CoinFabrik, 50.

Jha, A. C. (2020). Positional Number System. NUTA Journal, 1-9.

Kaltofen, E. L. (2000). Early termination in Ben-Or/Tiwari sparse interpolation and a hybrid of Zippel's algorithm. Proceedings of the 2000 international symposium on Symbolic and algebraic computation, 192-201.

Katz, J. (2014). Introduction to modern cryptography: principles and protocols (2 ed.). Chapman and Hall.

Knuth, D. (1997). The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Third Edition. Addison-Wesley, 65–66, 208–209, and 290.

Lyubomudrov, A. A. (2014). The method for converting numbers represented in a positional number system into the residue number system. Vestnik Natsional'nogo Issledovatel'skogo Yadernogo Universiteta MIFI, 252-253.

Salamat, S. (2021). Fast and Energy Efficient Big Data Processing on FPGAs. UC San Diego Electronic Theses and Dissertations.

Shi, X. (2015). A novel memristive electronic synapse-based Hermite chaotic neural network with application in cryptography. Neurocomputing 166, 487-495.

Shirbhate, R. P. (2015). Design of parallel FFT architecture using Cooley Tukey algorithm. International Conference on Communications and Signal Processing (ICCSP) , 574-578.

Srivastava, V. (2021). Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme. Provable and Practical Security. doi:https://doi.org/10.1007/978-3-030-90402-9_16

Thiel, C. a. (2021). Quantum Computer Resistant Cryptographic Methods and Their Suitability for Long-Term Preservation of Evidential Value. BLED. Retrieved from https://aisel.aisnet.org/bled2021/30

Valueva, M. (2020). Application of the residue number system to reduce hardware costs of the convolutional neural network implementation. Mathematics and Computers in Simulation, 177, 232-243. doi:https://doi.org/10.1016/j.matcom.2020.04.031.

Downloads

Published

2022-07-22

How to Cite

Bildziuk, D., Mikhaylov, D., & Shazhaev, I. (2022). TESTING OF PARALLEL CRYPTOGRAPHIC ALGORITHMS. Journal of Management & Technology, 22, 73–101. https://doi.org/10.20397/2177-6652/2022.v22i0.2374