Presentation | 2005-07-22 Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices Tetsuya IZU, Noboru KUNIHIRO, Kazuo OHTA, Takeshi SHIMOYAMA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based PKI. In some devices, the clockwise transposition is used as a key technique, however, because of the lack of theoretic proof of the termination, some additional circuits are required. In this paper, we analyze the packet exchanging rule for the clockwise transposition and propose some possible alternatives with keeping the "farthest-first" property. Although we have no theoretic proof of the termination, experimental results show actual availability in the clockwise transposition. We also propose an improvement on the routing algorithm for the relation finding step, which establishes two times speed-up. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Integer factoring / ASIC / RSA / clockwise transposition / YASD |
Paper # | ISEC2005-57 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2005/7/15(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices |
Sub Title (in English) | |
Keyword(1) | Integer factoring |
Keyword(2) | ASIC |
Keyword(3) | RSA |
Keyword(4) | clockwise transposition |
Keyword(5) | YASD |
1st Author's Name | Tetsuya IZU |
1st Author's Affiliation | Secure Computing Lab., FUJITSU LABORATORIES LTD.:Dept. of Information and Communication Eng., The University of Electro-Communications() |
2nd Author's Name | Noboru KUNIHIRO |
2nd Author's Affiliation | Dept. of Information and Communication Eng., The University of Electro-Communications |
3rd Author's Name | Kazuo OHTA |
3rd Author's Affiliation | Dept. of Information and Communication Eng., The University of Electro-Communications |
4th Author's Name | Takeshi SHIMOYAMA |
4th Author's Affiliation | Secure Computing Lab., FUJITSU LABORATORIES LTD. |
Date | 2005-07-22 |
Paper # | ISEC2005-57 |
Volume (vol) | vol.105 |
Number (no) | 194 |
Page | pp.pp.- |
#Pages | 7 |
Date of Issue |