Research Article

Mimic Encryption Box for Network Multimedia Data Security

Algorithm 3

Montgomery point multiplication.
Input: , point G
Output: Q=kG
(1)Initialize R0 = G; R1 = 2G; i = l – 2;
(2)while ()
(3) if (ki = = 0) R1 = R0 + R1; R0 = 2R0;
(4) else if (ki = = 1) R0 = R0 + R1; R1 = 2R1;
(5)i = i – 1;
(6)endwhile
(7)Q = R0;