Presentation 2005-07-22
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
Tetsuya IZU, Noboru KUNIHIRO, Kazuo OHTA, Takeshi SHIMOYAMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based PKI. In some devices, the clockwise transposition is used as a key technique, however, because of the lack of theoretic proof of the termination, some additional circuits are required. In this paper, we analyze the packet exchanging rule for the clockwise transposition and propose some possible alternatives with keeping the "farthest-first" property. Although we have no theoretic proof of the termination, experimental results show actual availability in the clockwise transposition. We also propose an improvement on the routing algorithm for the relation finding step, which establishes two times speed-up.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Integer factoring / ASIC / RSA / clockwise transposition / YASD
Paper # ISEC2005-57
Date of Issue

Conference Information
Committee ISEC
Conference Date 2005/7/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
Sub Title (in English)
Keyword(1) Integer factoring
Keyword(2) ASIC
Keyword(3) RSA
Keyword(4) clockwise transposition
Keyword(5) YASD
1st Author's Name Tetsuya IZU
1st Author's Affiliation Secure Computing Lab., FUJITSU LABORATORIES LTD.:Dept. of Information and Communication Eng., The University of Electro-Communications()
2nd Author's Name Noboru KUNIHIRO
2nd Author's Affiliation Dept. of Information and Communication Eng., The University of Electro-Communications
3rd Author's Name Kazuo OHTA
3rd Author's Affiliation Dept. of Information and Communication Eng., The University of Electro-Communications
4th Author's Name Takeshi SHIMOYAMA
4th Author's Affiliation Secure Computing Lab., FUJITSU LABORATORIES LTD.
Date 2005-07-22
Paper # ISEC2005-57
Volume (vol) vol.105
Number (no) 194
Page pp.pp.-
#Pages 7
Date of Issue