A Multi-layer Recursive Residue Number System

01/15/2018
by   Henk D. L. Hollmann, et al.
0

We present a method to increase the dynamical range of a Residue Number System (RNS) by adding virtual RNS layers on top of the original RNS, where the required modular arithmetic for a modulus on any non-bottom layer is implemented by means of an RNS Montgomery multiplication algorithm that uses the RNS on the layer below. As a result, the actual arithmetic is deferred to the bottom layer. The multiplication algorithm that we use is based on an algorithm by Bajard and Imbert, extended to work with pseudo-residues (remainders with a larger range than the modulus). The resulting Recursive Residue Number System (RRNS) can be used to implement modular addition, multiplication, and multiply-and-accumulate for very large (2000+ bits) moduli, using only modular operations for small (for example 8-bits) moduli. A hardware implementation of this method allows for massive parallelization. Our method can be applied in cryptographic algorithms such as RSA to realize modular exponentiation with a large (2048-bit, or even 4096-bit) modulus. Due to the use of full RNS Montgomery algorithms, the system does not involve any carries, therefore cryptographic attacks that exploit carries cannot be applied.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/04/2016

Automatic Generation of Vectorized Montgomery Algorithm

Modular arithmetic is widely used in crytography and symbolic computatio...
research
10/05/2019

Secure Montgomery Multiplication and Repeated Squares for Modular Exponentiation

The BMR16 circuit garbling scheme introduces gadgets that allow for ciph...
research
07/27/2022

Modular Multiplication without Carry Propagation (Algorithm Description)

This paper describes a sufficiently simple modular multiplication algori...
research
03/08/2021

A Hole in the Ladder: Interleaved Variables in Iterative Conditional Branching (Extended Version)

The iterative conditional branchings appear in various sensitive algorit...
research
11/05/2020

Iterated multiplication in VTC^0

We show that VTC^0, the basic theory of bounded arithmetic corresponding...
research
09/01/2023

Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices

This paper presents another improved version of Plantard arithmetic that...
research
09/08/2020

Quad-Core RSA Processor with Countermeasure Against Power Analysis Attacks

Rivest-Shamir-Adleman (RSA) cryptosystem uses modular multiplication for...

Please sign up or login with your details

Forgot password? Click here to reset