International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 73 | Issue 12 | Year 2025 | Article Id. IJETT-V73I12P102 | DOI : https://doi.org/10.14445/22315381/IJETT-V73I12P102

Fast and Low Power Implementation of RSA on Ternary Galois Field


Srividya B V, Nagarathna, Soumya S, Harikeerthan M K

Received Revised Accepted Published
08 Mar 2025 14 Nov 2025 25 Nov 2025 19 Dec 2025

Citation :

Srividya B V, Nagarathna, Soumya S, Harikeerthan M K, "Fast and Low Power Implementation of RSA on Ternary Galois Field," International Journal of Engineering Trends and Technology (IJETT), vol. 73, no. 12, pp. 10-23, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I12P102

Abstract

Data transmission and reception are getting more expensive. As a result, it is now more challenging to store and maintain the security of information. This necessitates a secure connection in each application. One potential method for data security is cryptography. Besides defense-related uses, cryptography has many other uses in the modern world, including social networking, email, and e-commerce. Cryptography is a crucial element of pre-designed interfaces, such as embedded systems. The majority of cryptographic methods involve modular operations involving Galois Fields GF (pm), where ‘m’ stands for power and ‘p’ for base, which are prime numbers. This research uses the Forced Stack approach, which has a low leakage power, to implement the Ternary Galois field. This work reports a low-power and high-frequency RSA cryptosystem to accomplish the goal. In order to implement the algorithm in hardware, Ternary circuits that are capable of efficiently carrying out the encryption, decryption, key generation, and key storage operations for the RSA algorithm have been designed using Cadence Virtuoso.

Keywords

Low power ternary VLSI circuits, Ternary galois field, RSA algorithm, Encryption, Decryption.

References

[1] V.T. Gaikwad, and P.R. Deshmukh, “Implementation of Low Power Ternary Logic Gates using CMOS Technology,” International Journal of Science and Research (IJSR), vol. 3, no. 10, pp. 2221-2224, 2014.
[Publisher Link]

[2] V.T. Gaikwad, and P.R. Deshmukh, “Design of CMOS Ternary Logic Family based on Single Supply Voltage,” 2015 International Conference on Pervasive Computing (ICPC), Pune, India, pp. 1-6, 2015.
[CrossRef] [Google Scholar] [Publisher Link]

[3] Sunmean Kim, Taeho Lim, and Seokhyeong Kang, “An Optimal Gate Design for the Synthesis of Ternary Logic Circuits,” 2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), Jeju, Korea (South), pp. 476-481, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[4] A.P. Dhande, Satish S. Narkhede, and Shridhar S. Dudam, “VLSI Implementation of Ternary Gates using Tanner Tool” 2014 2nd International Conference on Devices, Circuits and Systems (ICDCS), Coimbatore, India, vol. 137, pp. 1-5, 2014.
[CrossRef] [Google Scholar] [Publisher Link]

[5] A. Steegen et al., “65nm CMOS Technology for Low Power Applications,” IEEE International Electron Devices Meeting, 2005, IEDM Technical Digest, Washington, DC, pp. 64-67, 2005.
[CrossRef] [Google Scholar] [Publisher Link]

[6] K. Koh et al., “Highly Manufacturable 100nm 6T Low Power SRAM with Single Poly-Si Gate Technology,” 2003 International Symposium on VLSI Technology, Systems and Applications, Proceedings of Technical Papers, (IEEE Cat. No.03TH8672), Hsinchu, Taiwan, pp. 64-67, 2003.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] S. Zhao et al., “Transistor Optimization for Leakage Power Management in a 65nm CMOS Technology for Wireless and Mobile Applications,” Digest of Technical Papers, 2004 Symposium on VLSI Technology, HI, USA, pp. 14-15, 2004.
[
CrossRef] [Google Scholar] [Publisher Link]

[8] C.H. Kim et al., “PVT-Aware Leakage Reduction for on-Die Caches with Improved Read Stability,” IEEE Journal of Solid-State Circuits, vol. 41, no. 1, pp. 170-178, 2006.
[
CrossRef] [Google Scholar] [Publisher Link]

[9] Krisztián Flautner et al., “Drowsy Caches: Simple Techniques for Reducing Leakage Power,” Proceedings 29th Annual International Symposium on Computer Architecture, Anchorage, AK, pp. 148-157, 2002.
[
Google Scholar] [Publisher Link]

[10] Erfan Shahrom, and Seied Ali Hosseini, “A New Low Power Multiplexer Based Ternary Multiplier using CNTFETs” AEU- International Journal of Electronics and Communications, vol. 93, pp. 191-207, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[11] Aiman Malik, Md. Shahbaz Hussain, and Mohd. Hasan, “An Approximate Ternary Full Adder using Carbon Nanotube Field Effect Transistors,” 2022 5th International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]

[12] Sheba Diamond Thabah et al., “Fast and Area Efficient Implementation of RSA Algorithm,” Procedia Computer Science, vol. 165, pp. 525-531, 2019.
[CrossRef] [Google Scholar] [Publisher Link]

[13] Chi-Chia Sun et al., “VLSI Design of a RSA Encryption/Decryption Chip using Systolic Array based Architecture,” International Journal of Electronics, vol. 103, no. 9, pp. 1538-1549, 2016.
[CrossRef] [Google Scholar] [Publisher Link]

[14] Sapna Saxena, and Bhanu Kapoor, “State of the Art Parallel Approaches for RSA Public Key Based Cryptosystem,” International Journal on Computational Science & Applications (IJCSA), vol. 5, no. 1, pp. 1-8, 2015.
[
Google Scholar] [Publisher Link]

[15] Jongho Yoon et al., “Optimizing Ternary Multiplier Design with Fast Ternary Adder,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 70, no. 2, pp. 766-770, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] Xiao-Yuan Wang et al., “A Review on the Design of Ternary Logic Circuits,” Chinese Physics B, vol. 30, no. 12, pp. 1-20, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[17] Ashwinikumar P. Dhande, Vijay T. Ingole, and Vikram R. Ghiye, Ternary Digital System: Concepts and Applications, SM Online Publishers LLC, 2014.
[Google Scholar]

[18] Oded Goldreich, Foundations of Cryptography: Basic Applications, vol. 2, Cambridge University Press, 2001.
[
Google Scholar] [Publisher Link]

[19] Douglas Stinson, Cryptography: Theory and Practice, 2nd ed., CRC/C&H, 2002.
[
Google Scholar] [Publisher Link]

[20] Srinivasan Rajavelu et al., “Single Chip Efficient FPGA Implementation of RSA and DES or Digital Envelop Scheme,” WSEAS Transactions on Communications, vol. 3, no. 2, 664-669., 2004.
[
Google Scholar] [Publisher Link]

[21] Rehan Fozia, Fozia Hanif Khan, and Mohammad Umair, “Cryptosystem an implementation of RSA using Verilog.” International Journal of Computer Networks and Communications Security, vol. 1, No. 3, pp. 102-109. 2013.
[
Google Scholar]