It is widely recognized that security in networks is still a significant challenge for researchers. A central tool for achieving system security is cryptographic algorithms which are computationally intensive. Among the various techniques found in the cryptography realm, the Rivest-Shamir-Adleman (RSA) algorithms, which is based on modular multiplications and exponentiation, has become the default standard for public key cryptography. It is computationally resource-intensive and time-consuming given a minimumally secure operand size of 1024 bits or greater. For high performance and considerable resistance to tampering attacks reasons, it is often advantageous to realize cryptographic algorithms in hardware.