Faster ECC over F 2 521 − 1
نویسندگان
چکیده
In this paper we present a new multiplication algorithm for residues modulo the Mersenne prime 2 − 1. Using this approach, on an Intel Haswell Core i7-4770, constant-time variable-base scalar multiplication on NIST’s (and SECG’s) curve P-521 requires 1,108,000 cycles, while on the recently proposed Edwards curve E-521 it requires just 943,000 cycles. As a comparison, on the same architecture openSSL’s ECDH speed test for curve P-521 requires 1,319,000 cycles. Furthermore, our code was written entirely in C and so is robust across different platforms. The basic observation behind these speedups is that the form of the modulus allows one to multiply residues with as few word-by-word multiplications as is needed for squaring, while incurring very little overhead from extra additions, in contrast to the usual Karatsuba methods.
منابع مشابه
Area Flexible GF(2k) Elliptic Curve Cryptography Coprocessor
Elliptic curve cryptography (ECC) is popularly defined either over GF(p) or GF(2 k). This research modifies a GF(p) multiplication algorithm to make it applicable for GF(2 k). Both algorithms, the GF(p) and GF(2 k) one, are designed in hardware to be compared. The GF(2 k) multiplier is found faster and small. This GF(2 k) multiplier is further improved to benefit in speed, it gained more than 4...
متن کاملMuscle damage and soreness after endurance exercise of the elbow flexors.
PURPOSE This study investigated changes in indirect markers of muscle damage after endurance exercise of the elbow flexors and compared the changes with those after maximal eccentric actions (Max-ECC) of the elbow flexors. METHODS Eighteen male students rhythmically lifted (1 s) and lowered (1 s) a light dumbbell (1.1-1.8 kg: 9% of MIF) in 60-180 degrees of elbow joint angle for 2 h (2-h Ex)....
متن کاملCustomising Hardware Designs for Elliptic Curve Cryptography
This paper presents a method for producing hardware designs for Elliptic Curve Cryptography (ECC) systems over the finite field GF(2), using the optimal normal basis for the representation of numbers. A design generator has been developed which can automatically produce a customised ECC hardware design that meets user-defined requirements. This method enables designers to rapidly explore and im...
متن کاملTinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF (2) on 8-bit MICAz Mote
In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2) is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF (2) on sensor motes, their performances are not satisfactory enough t...
متن کاملTinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
In this paper, we revisit a generally accepted opinion: implementing Elliptic Curve Cryptosystem (ECC) over GF (2) on sensor motes using small word size is not appropriate because XOR multiplication over GF (2) is not efficiently supported by current low-powered microprocessors. Although there are some implementations over GF (2) on sensor motes, their performances are not satisfactory enough t...
متن کامل