Title :
Operation of Super Long Integers in Cryptographic Applications
Author :
Su, Shenghui ; Li, Jian ; Shi, Lei
Author_Institution :
Coll. of Comput. Sci., Beijing Univ. of Technol., Beijing
Abstract :
Super long integers which are outside the confines of numbers defined in existent program language compilers or interpreters are widely employed in cryptographic applications. The paper designs 10 algorithms, which almost all address operands by the byte, and are used for the operation of unsigned super long integers, including conversion, shift, comparison, addition, subtraction, multiplication, division, and power. The paper analyzes the time complexity of each of the algorithms in the amount of bit operations, presents the source code of the power operation in C, and gives some examples which are utilized for validating the correctness of the algorithms according to the properties of a group.
Keywords :
C language; computational complexity; cryptography; number theory; C power operation; algorithm time complexity; bit operation; cryptographic application; program language compiler; program language interpreter; source code; super long integer operation; Algorithm design and analysis; Application software; Arithmetic; Computer science; Distributed computing; Educational institutions; Elliptic curve cryptography; Keyboards; Program processors; Public key cryptography; Algorithm design; Correctness validation; Modular arithmetic; Super long integer; Time complexity;
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2008. PDCAT 2008. Ninth International Conference on
Conference_Location :
Otago
Print_ISBN :
978-0-7695-3443-5
DOI :
10.1109/PDCAT.2008.70