Research Article | Open Access | Download PDF
Volume 73 | Issue 12 | Year 2025 | Article Id. IJETT-V73I12P102 | DOI : https://doi.org/10.14445/22315381/IJETT-V73I12P102Fast and Low Power Implementation of RSA on Ternary Galois Field
Srividya B V, Nagarathna, Soumya S, Harikeerthan M K
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 08 Mar 2025 | 14 Nov 2025 | 25 Nov 2025 | 19 Dec 2025 |
Citation :
Srividya B V, Nagarathna, Soumya S, Harikeerthan M K, "Fast and Low Power Implementation of RSA on Ternary Galois Field," International Journal of Engineering Trends and Technology (IJETT), vol. 73, no. 12, pp. 10-23, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I12P102
Abstract
Data transmission and reception are getting more expensive. As a result, it is now more challenging to store and maintain the security of information. This necessitates a secure connection in each application. One potential method for data security is cryptography. Besides defense-related uses, cryptography has many other uses in the modern world, including social networking, email, and e-commerce. Cryptography is a crucial element of pre-designed interfaces, such as embedded systems. The majority of cryptographic methods involve modular operations involving Galois Fields GF (pm), where ‘m’ stands for power and ‘p’ for base, which are prime numbers. This research uses the Forced Stack approach, which has a low leakage power, to implement the Ternary Galois field. This work reports a low-power and high-frequency RSA cryptosystem to accomplish the goal. In order to implement the algorithm in hardware, Ternary circuits that are capable of efficiently carrying out the encryption, decryption, key generation, and key storage operations for the RSA algorithm have been designed using Cadence Virtuoso.
Keywords
Low power ternary VLSI circuits, Ternary galois field, RSA algorithm, Encryption, Decryption.
References
[1] V.T. Gaikwad, and P.R. Deshmukh, “Implementation of
Low Power Ternary Logic Gates using CMOS Technology,” International Journal of Science and Research (IJSR), vol. 3, no.
10, pp. 2221-2224, 2014.
[Publisher Link]
[2] V.T. Gaikwad, and P.R. Deshmukh, “Design of CMOS
Ternary Logic Family based on Single Supply Voltage,” 2015 International Conference on Pervasive Computing (ICPC), Pune,
India, pp. 1-6, 2015.
[CrossRef]
[Google Scholar] [Publisher
Link]
[3] Sunmean Kim, Taeho Lim, and Seokhyeong Kang, “An
Optimal Gate Design for the Synthesis of Ternary Logic Circuits,” 2018 23rd Asia and South Pacific
Design Automation Conference (ASP-DAC), Jeju, Korea (South), pp. 476-481,
2018.
[CrossRef]
[Google Scholar] [Publisher
Link]
[4] A.P. Dhande, Satish S. Narkhede, and Shridhar S.
Dudam, “VLSI Implementation of Ternary Gates using Tanner Tool” 2014 2nd International Conference
on Devices, Circuits and Systems (ICDCS), Coimbatore, India, vol. 137, pp.
1-5, 2014.
[CrossRef]
[Google Scholar] [Publisher
Link]
[5] A.
Steegen et al., “65nm CMOS Technology for Low Power Applications,” IEEE International Electron Devices Meeting,
2005, IEDM Technical Digest, Washington, DC, pp. 64-67, 2005.
[CrossRef]
[Google Scholar] [Publisher
Link]
[6] K.
Koh et al., “Highly Manufacturable 100nm 6T Low Power SRAM with Single Poly-Si
Gate Technology,” 2003 International
Symposium on VLSI Technology, Systems and Applications, Proceedings of
Technical Papers, (IEEE Cat. No.03TH8672), Hsinchu, Taiwan, pp. 64-67,
2003.
[CrossRef] [Google Scholar] [Publisher
Link]
[7] S.
Zhao et al., “Transistor Optimization for Leakage Power Management in a 65nm
CMOS Technology for Wireless and Mobile Applications,” Digest of Technical Papers, 2004 Symposium on VLSI Technology, HI,
USA, pp. 14-15, 2004.
[CrossRef]
[Google Scholar] [Publisher
Link]
[8] C.H.
Kim et al., “PVT-Aware Leakage Reduction for on-Die Caches with Improved Read
Stability,” IEEE Journal of Solid-State
Circuits, vol. 41, no. 1, pp. 170-178, 2006.
[CrossRef]
[Google Scholar] [Publisher
Link]
[9] Krisztián
Flautner et al., “Drowsy Caches: Simple Techniques for Reducing Leakage Power,”
Proceedings 29th Annual
International Symposium on Computer Architecture, Anchorage, AK, pp.
148-157, 2002.
[Google Scholar] [Publisher
Link]
[10] Erfan Shahrom, and Seied Ali Hosseini, “A New Low
Power Multiplexer Based Ternary Multiplier using CNTFETs” AEU- International Journal of Electronics and Communications, vol.
93, pp. 191-207, 2018.
[CrossRef]
[Google Scholar] [Publisher Link]
[11] Aiman Malik, Md. Shahbaz Hussain, and Mohd. Hasan,
“An Approximate Ternary Full Adder using Carbon Nanotube Field Effect
Transistors,” 2022 5th
International Conference on Multimedia, Signal Processing and Communication Technologies
(IMPACT), Aligarh, India, pp. 1-6, 2022.
[CrossRef] [Google Scholar] [Publisher
Link]
[12] Sheba Diamond Thabah et al., “Fast and Area
Efficient Implementation of RSA Algorithm,” Procedia
Computer Science, vol. 165, pp. 525-531, 2019.
[CrossRef]
[Google Scholar] [Publisher Link]
[13] Chi-Chia Sun et al., “VLSI Design of a RSA
Encryption/Decryption Chip using Systolic Array based Architecture,” International Journal of Electronics,
vol. 103, no. 9, pp. 1538-1549, 2016.
[CrossRef]
[Google Scholar] [Publisher Link]
[14] Sapna Saxena, and Bhanu Kapoor, “State of the Art
Parallel Approaches for RSA Public Key Based Cryptosystem,” International Journal on Computational
Science & Applications (IJCSA), vol. 5, no. 1, pp. 1-8, 2015.
[Google Scholar] [Publisher
Link]
[15] Jongho Yoon et al., “Optimizing Ternary Multiplier
Design with Fast Ternary Adder,” IEEE
Transactions on Circuits and Systems II: Express Briefs, vol. 70, no. 2,
pp. 766-770, 2023.
[CrossRef]
[Google Scholar] [Publisher
Link]
[16] Xiao-Yuan
Wang et al., “A Review on the Design of Ternary Logic Circuits,” Chinese Physics B, vol. 30, no. 12, pp.
1-20, 2021.
[CrossRef]
[Google Scholar] [Publisher Link]
[17] Ashwinikumar P. Dhande, Vijay T. Ingole, and Vikram
R. Ghiye, Ternary Digital System:
Concepts and Applications, SM Online Publishers LLC, 2014.
[Google Scholar]
[18] Oded
Goldreich, Foundations of Cryptography:
Basic Applications, vol. 2, Cambridge University Press, 2001.
[Google Scholar] [Publisher Link]
[19] Douglas
Stinson, Cryptography: Theory and
Practice, 2nd ed., CRC/C&H, 2002.
[Google Scholar] [Publisher Link]
[20] Srinivasan
Rajavelu et al., “Single Chip Efficient FPGA Implementation of RSA and DES or
Digital Envelop Scheme,” WSEAS
Transactions on Communications, vol. 3, no. 2, 664-669., 2004.
[Google Scholar] [Publisher Link]
[21] Rehan Fozia, Fozia Hanif Khan, and
Mohammad Umair, “Cryptosystem an implementation of RSA using Verilog.” International Journal of Computer Networks
and Communications Security, vol. 1, No. 3, pp. 102-109. 2013.
[Google Scholar]