Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RSA Private/Public Key Final generation #31

Open
arcfide opened this issue Jul 16, 2014 · 2 comments
Open

RSA Private/Public Key Final generation #31

arcfide opened this issue Jul 16, 2014 · 2 comments
Assignees
Labels

Comments

@arcfide
Copy link
Collaborator

arcfide commented Jul 16, 2014

No description provided.

@arcfide arcfide added this to the Release v0.1 milestone Jul 16, 2014
@arcfide arcfide added the task label Jul 16, 2014
@Tikhon03 Tikhon03 self-assigned this Jul 16, 2014
@Tikhon03
Copy link
Collaborator

This requires implementation of modular exponentiation. Several algorithms for modular exponentiation exist, not all of which seem likely to have uniform time implementations. The most promising two are:

(1) Sliding window exponentiation
(2) The Montgomery ladder

The Chinese Remainder Theorem, which should already have been implemented in Step 4 and 5 of Key Generation, should make the implementation more efficient, since reduction mod p and mod q will be faster than reduction mod pq.

@Tikhon03
Copy link
Collaborator

For an implementation on binary arrays, the Montgomery ladder seems almost trivial in APL, and may not take more than one line of code. Sliding window exponentiation should still be reasonable but requires precomputation of odd powers up to some prescribed exponent. Both algorthims should be easy to implement in a way that is independent of the group law, since the power operator already has this capability built in.

arcfide pushed a commit that referenced this issue Nov 22, 2019
tan added. five tests failing
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Development

No branches or pull requests

2 participants