You are on page 1of 5

CONTENTS

ABSTRACT....................................................................................................................vi
CONTENTS...................................................................................................................vii
LIST OF FIGURES.....................................................................................................viii
LIST OF TABLES..........................................................................................................ix
1. INTRODUCTION.....................................................................................................1
1.1 CRYPTOGRAPHY .....................................................................1
1.2 TYPES OF
CRYPTOGRAPHY......................................................................1
1.3 MAIN OBJECTIVE .......................................................................8
1.4 OUTLINE OF THESIS…............................................................................8
2. BACKGROUND AND LITERATURE
REVIEW............................................................................................5
2.1 MONTGOMERY
MULTIPLICATION ........................................................................17
2.2 LITERATURE REVIEW ON MONTGOMERY
MULTIPIER ....................................................................17
3. ARCHITECTURE OF MONTGOMERY MULTIPIER
..............................................................................17
4. REVIEW OF PERFORMANCE ON MONTGOMERY MULTIPLIER WITH
DIFFERENT ADDERS
5. METHODOLOGY FOR SPEED OPTIMIZATION OF
MONTGOMERY MULTIPLICATION ...........................................................33
6. RESULT AND ANALYSIS
6.1 PERFORMANCE EVALUATION
7. TECHNOLOGY SCHEMATICS AND RTL VIEW OF MONTGOMERY
MULTIPLIER
8. PYXIS LAYOUT
8.1 PYXIS LAYOUT OF MONTGOMERY MULTIPLIER
9. CONCLUSION AND FUTURE SCOPE
9.1 CONCLUSION
9.2 FUTURE SCOPE REFER RECENT PAPER FOR PROBLEM AND SCOPE
LIST OF PUBLICATION............................................................................................34
REFERENCES..............................................................................................................35
APPENDIX.....................................................................................................................37
APPENDIX A- .......................................37
APPENDIX B-...............................................................39
APPENDIX C- CERTIFICATE FOR PRESENTED PAPER............................40
PAPER PRESENTED...................................................................................................43
PLAGIARIASM REPORT...........................................................................................49

LIST OF FIGURES

Fig. 3.1 SYMMETRIC CRYPTOGRAPHY ...................................10


Fig. 3.2 ASSYMMETRIC
CRYPTOGRAPHY .....................................................................12
Fig. 4.4.1 ELLIPTIC CURVE ...................................................24
Fig. 4.4.2 STRENGTH OF ALGORITHM AGAINST KEY
SIZE ........................................24
Fig. 4.4.3 BLOCK DIAGRAM OF FIVE -TO- TWO
CSA .......................................................25
Fig. 4.4.4 BLOCK DIAGRAM OF FOUR -TO- TWO CSA
.......................................................................25
Fig. 4.4.5 MONTGOMERY MULTIPICATION
HARDWARE.............................................26
Fig. 4.4.6 CARRY SAVE ADDER...........................................26
Fig. 4.4.7 MONTGOMERY MULTIPLICATION USING CARRY SAVE
ADDER ............................................................27
Fig. 4.4.8 PRECOMPUTATION ARCHITECTURE OF MONTGOMERY
MULTIPLIER..................................27
Fig. 4.4.9 SEMI- CARRY- SAVE MONTGOMERY
MULTIPIER ...........................................................................28
Fig. 4.4.10 FULL- CARRY SAVE MONTGOMERY
MULTIPIER .....................................................................28
Fig. 4.4.11 MODIFIED SEMI CARRY SAVE MONTGOMERY
MULTIPLIER.............................................29
Fig. 4.4.12 UNFOLDED MODIFIED SEMI CARRY SAVE
MONTGOMERY
MULTIPLIER...............................................................................29
Fig. 4.4.13 CARRY SAVE ADDER MONTGOMERY
MULTIPLIER.......................................................30
Fig. 4.4.14 PRECOMPUTATION BASED MONTGOMERY MULTIPLIER RTL
VIEW .....................................................30
Fig. 4.4.15 SEMI CARRY SAVE MONTGOMERY MULTIPLIER RTL
VIEW .....................................................30
Fig. 4.4.16 UNFOLDED SEMI CARRY SAVE MONTGOMERY
MULTIPLIER RTL VIEW .....................................................30

Fig. 4.4.17 FULL CARRY SAVE MONTGOMERY MULTIPLIER RTL


VIEW .....................................................30
Fig. 4.4.17 UNFOLDED FULL CARRY SAVE MONTGOMERY
MULTIPLIER RTL VIEW .....................................................30
Fig. 4.4.17 MODIFIED SEMI CARRY SAVE MONTGOMERY
MULTIPLIER RTL VIEW .....................................................30
Fig. 4.4.17 PYXIS LAYOUT OF UNFOLDED SEMI CARRY SAVE
ARCHITECTURE OF MONTGOMERY MULTIPIER
Fig. 4.4.17 PYXIS LAYOUT OF FULL SEMI CARRY SAVE ARCHITECTURE
OF MONTGOMERY MULTIPIER
..................................................30
Fig. 4.4.17 PYXIS LAYOUT OF UNFOLDED FULL CARRY SAVE
ARCHITECTURE OF MONTGOMERY
MULTIPIER .....................................................30
Fig. 4.4.17 PYXIS LAYOUT OF UNFOLDED MODIFIED SEMI CARRY SAVE
ARCHITECTURE OF MONTGOMERY MULTIPIER
.....................................................30
LIST OF TABLE

Table 3.1 COMPARISION OF KEY SIZE OF DIFFERENT TYPE OF


ASSYMETRIC KEY CRYPTOGRAPHY
ALGORITHM.............................................15
Table 3.2 LOOKUP TABLE CONTAINING PRECOMPUTED VALUES
.......................................................................................16
Table 4.2.1 COMPARISION OF MONTGOMERY MULTIPIER CIRCUIT WITH
DIFFERENT ADDERS STRUCTURE
.........................................................................18
Table 4.2.2 ANALYSIS OF AREA AND DELAY OF DIFFERENT DESIGN IN
FPGA ....................19

You might also like