Skip to main content

Modular Addition and Multiplication

  • Chapter
  • First Online:
Cryptography Arithmetic

Part of the book series: Advances in Information Security ((ADIS,volume 77))

  • 1491 Accesses

Abstract

This chapter consists of two sections that cover algorithms and hardware architectures for modular addition and multiplication: (x + y) mod  m and xy mod  m. Subtraction and division are also included—as the addition of an inverse and as multiplication by an inverse. The underlying algorithms and hardware structures are those of Chap. 1, modified for modular arithmetic. For both operations we shall consider generic algorithms and hardware structures for arbitrary moduli and also those for special moduli.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Strictly, the first addition may be in n bits.

  2. 2.

    Recall that such a compressor can be built to have a delay that is slightly larger than that through a 3:2 compressor.

  3. 3.

    In ordinary multiplication the 2i factor is taken care of by shifting the partial product instead of the multiplicand multiple. That is possible because the lower order i bits of the ith partial product are not included in the corresponding addition. On the other hand, with modular multiplication—specifically the required reductions—all bits of a partial product must be included in the arithmetic; therefore, 2ixy i is taken in its entirety.

References

  1. R. Zimmerman. 1999. Efficient VLSI implementation of modulo (2n ± 1) addition and multiplication. Proceedings, International Symposium on Computer Arithmetic, pp. 158–167.

    Google Scholar 

  2. H. T. Vergos and C. Efstathiou. 2008. A unifying approach for weighted and diminished-one modulo 2n + 1 addition. IEEE Transactions on Circuits and Systems II, 55:1041–1045.

    Article  Google Scholar 

  3. L. Sousa and R. Chaves. 2005. A universal architecture for designing efficient modulo 2n + a multipliers. IEEE Transactions on Circuits and Systems I, 52(6):1166–1178.

    Article  MathSciNet  Google Scholar 

  4. R. Muralidharan and C.-H. Chang. 2012. Area-power efficient modulo 2n − 1 and modulo 2n + 1 multipliers for {2n − 1,  2n,  2n + 1} based RNS. IEEE Transactions on Circuits and Systems I, 59(10):2263–2274.

    Article  MathSciNet  Google Scholar 

  5. J. W. Chen, R. H. Yao, and W. J. Wu. 2011. Efficient modulo 2n + 1 multipliers. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 19(12):2149–2157.

    Article  Google Scholar 

  6. M. Knezevic, F. Vercauteren, and I. Verbauwhede. 2010. Faster interleaved modular multiplication based on Barrett and Montgomery reduction methods. IEEE Transactions on Computers, 59(12):1715–17121.

    Article  MathSciNet  Google Scholar 

  7. H. Orup. 1995. Simplifying quotient determination in high-radix modular multiplication. In: Proceedings, 12th Symposium on Computer Arithmetic, pp. 193–199.

    Google Scholar 

  8. P. Kornerup. 1993. High-radix modular multiplication for cryptosystems. In: Proceedings, 12th Symposium on Computer Arithmetic, pp. 277–283.

    Google Scholar 

  9. A. V. Curiger, H. Bonennenberg, and H. Kaeslin. 1991. Regular VLSI architectures for multiplication modulo 2n + 1. IEEE Journal of Solid-State Circuits, 26(7):990–994.

    Article  Google Scholar 

  10. M.-D. Shieh, J.-H. Chen, W.-C. Lin, and H.-H. Wu. 2009. A new algorithm for high-speed modular multiplication design. IEEE Transactions on Circuits and Systems I, 56(9): 2009–2019.

    Article  MathSciNet  Google Scholar 

  11. S.-R. Kuang, J. -P. Wang, K.-C. Chang, and H.-W. Hsu. 2013. Energy-efficient high-throughput Montgomery modular multipliers for RSA cryptosystems. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 21(11):1999–2009.

    Article  Google Scholar 

  12. A. Reza and P. Keshavarzi. 2015. High-throughput modular multiplication and exponentiation algorithms using multibit-scan—multibit-shift technique. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 23(9): 1710–1719.

    Article  Google Scholar 

  13. S.-R. Kung, K.-Y. Wu, and R.-Y. Lu. 2016. Low-cost high-performance VLSI architecture for Montgomery modular multiplication. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24(2):434–443.

    Article  Google Scholar 

  14. J.-C. Bajard, L.-S. Didier, and P. Kornerup. 1998. An RNS Montgomery modular multiplication algorithm. IEEE Transactions on Computers , 47(7):766–776.

    Article  MathSciNet  Google Scholar 

  15. H. K. Garg and H. Xiao. 2016. New residue based Barrett algorithms: modular integer computations. IEEE Access, 4:4882–4890.

    Article  Google Scholar 

  16. C. K. Koc. 1995. RSA Hardware Implementation. Report, RSA Laboratories. Redwood City, California, USA.

    Google Scholar 

  17. H. Orup and P. Kornerup. 1991. A high-radix hardware algorithm for calculating the exponential M E modulo N. Proceedings, 10th IEEE Symposium on Computer Arithmetic, pp. 51–56.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

R. Omondi, A. (2020). Modular Addition and Multiplication. In: Cryptography Arithmetic. Advances in Information Security, vol 77. Springer, Cham. https://doi.org/10.1007/978-3-030-34142-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34142-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34141-1

  • Online ISBN: 978-3-030-34142-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics