Abstract
We describe a cryptographic library for the Motorola DSP56000 that provides hardware speed yet software flexibility. The library includes modular arithmetic, DES, message digest and other methods. Of particular interest is an algorithm for modular multiplication that interleaves multiplication with Montgomery modular reduction to give a very fast implementation of RSA.
Keywords
- Data Encryption Standard (DES)
- Encryption hardware
- Message digest
- Modular arithmetic
- Montgomery reduction
- Motorola DSP56000
- Multiple-precision arithmetic
- RSA
Chapter PDF
References
Paul Barrett. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In A.M. Odlyzko, editor, Advances in Cryptology-CRYPTO’ 86 Proceedings, volume 263 of Lecture Notes in Computer Science, pages 311–323. Springer-Verlag, 1987.
Eli Biham and Adi Shamir. Differential analysis of DES-like cryptosystems (preprint). Proceedings of CRYPTO’ 90 (Santa Barbara, CA, August 12–15, 1990), to appear.
Jurjen Bos and Matthijs Coster. Addition chain heuristics. In G. Brassard, editor, Advances in Cryptology-CRYPTO’ 89 Proceedings, volume 435 of Lecture Notes in Computer Science, pages 400–407. Springer-Verlag, 1990.
Ernest F. Brickell. A survey of hardware implementations of RSA. In G. Brassard, editor, Advances in Cryptology-CRYPTO’ 89 Proceedings, volume 435 of Lecture Notes in Computer Science, pages 368–370. Springer-Verlag, 1990.
Duncan A. Buell and Robert L. Ward. A multiprecise integer arithmetic package. The Journal of Supercomputing, 3:89–107, 1989.
Computer data authentication. Federal Information Processing Standards Publication 113, National Bureau of Standards, U.S. Department of Commerce, 1985.
Data encryption standard. Federal Information Processing Standards Publication 46-1, National Bureau of Standards, U.S. Department of Commerce, 1977.
D.W. Davies and W.L. Price. The application of digital signatures based on public-key cryptosystems. In Proceedings of the Fifth International Computer Communications Conference, pages 525–530, 1980.
M. Davido, Y. Desmedt, M. Fosseprez, R. Govaerts, J. Hulsbosch, P. Neutjens, P. Piret, J.-J. Quisquater, J. Vandewalle and P. Wouters. Analytical characteristics of the DES. In D. Chaum, editor, Advances in Cryptology: Proceedings of Crypto’ 83, pages 171–202. Plenum Press, 1984.
Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert and Jean-Jacques Quisquater. Efficient hardware and software implementations for the DES. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology: Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 144–146. Springer-Verlag, 1985.
DES modes of operation. Federal Information Processing Standards Publication 81, National Bureau of Standards, U.S. Department of Commerce, 1980.
W. Diffie and M.E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, 1976.
Digital Signal Processors Quarter 3, 1989. Motorola, 1989.
DSP56000/DSP56001 Digital Signal Processor User’s Manual. Motorola, 1990.
DSP56001 Advance Information. Motorola, 1988.
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469–472, 1985.
David C. Feldmeier and Philip R. Karn. UNIX password security — ten years later. In G. Brassard, editor, Advances in Cryptology-CRYPTO’ 89 Proceedings, volume 435 of Lecture Notes in Computer Science, pages 44–63. Springer-Verlag, 1990.
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko, editor, Advances in Cryptology-CRYPTO’ 86 Proceedings, volume 263 of Lecture Notes in Computer Science, pages 186–194. Springer-Verlag, 1987.
L.S. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In C.G. Gunther, editor, Advances in Cryptology-EUROCRYPT’ 88 Proceedings, volume 330 of Lecture Notes in Computer Science, pages 123–128. Springer-Verlag, 1988.
Donald E. Knuth. Seminumerical algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, second edition, 1981.
Denis Laurichesse. Mise en oeuvre optimisee du chiffre RSA. Rapport Laas No. 90052, Laboratoire d’Automatique et D’Analyse des Systemes, 1990.
John Linn. Privacy enhancement for Internet electronic mail: Part III: Algorithms, modes, and identifiers. RFC 1115, Internet Activities Board Privacy Task Force, 1989.
Peter L. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519–521, 1985.
J.-J. Quisquater and C. Couvreur. Fast decipherment algorithms for RSA public-key cryptosystem. Electronics Letters, 18(21):905–907, 1982.
Ronald L. Rivest. The MD4 message digest algorithm (preprint). Proceedings of CRYPTO’ 90 (Santa Barbara, CA, August 12–15, 1990), to appear.
Ronald L. Rivest, Adi Shamir and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosytems. Communications of the ACM, 21(2):120–126, 1978.
A. Selby and C. Mitchell. Algorithms for software implementations of RSA. IEE Proceedings, 136 part E(3):166–170, 1989.
Michael K. Stauffer and Michael Slater. General-purpose digital signal processors. Microprocessor Report, 3(10):25–29, 1989.
M. Shand, P. Bertin and J. Vuillemin. Hardware speedups in long integer multiplication. Proceedings of the Second ACM Symposium on Parallel Algorithms and Architectures (Crete, July 2–6, 1990), to appear.
Michael Wiener. Personal communication, 1990.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dussé, S.R., Kaliski, B.S. (1991). A Cryptographic Library for the Motorola DSP56000. In: Damgård, I.B. (eds) Advances in Cryptology — EUROCRYPT ’90. EUROCRYPT 1990. Lecture Notes in Computer Science, vol 473. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46877-3_21
Download citation
DOI: https://doi.org/10.1007/3-540-46877-3_21
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53587-4
Online ISBN: 978-3-540-46877-6
eBook Packages: Springer Book Archive