Additive bit-serial algorithm for discrete logarithm modulo 2/sup k/ - Electronics Letters

نویسندگان

  • A. Fit - Florea
  • D. W. Matula
  • M. A. Thornton
چکیده

Introduction and summary: Hardware capabilities for integer arithmetic generally include addition, multiplication, and division with precision k typically chosen as 16, 32 or 64. Multiplication and division are often implemented by recursive bit serial algorithms employing O(k) serial additions to avoid the size and power requirements of a large multiplier. The integer addition and multiplication operations realised are effectively ‘exact’ residue arithmetic operations with modulo 2. Hardware support for applications where fast residue arithmetic computation is desirable is typically limited to only residue addition and multiplication. There is a need to find efficiently implementable algorithms for other fundamental residue operations for the ‘hardware friendly’ modulus 2. Furthermore, for implementations where hardware support does not include a large multiplier, there is a particular need for additive bit-serial algorithms for these additional residue operations. The fundamental residue arithmetic operations supplementing residue addition and multiplication of particular interest for feasibility of hardware implementation are: multiplicative inverse, powering (or exponentiation), and discrete logarithm. Following [1] we herein employ jnj2k 1⁄4 j to denote the congruence relation n j (mod 2) with the residue j satisfying 0 j 2 1. The discrete logarithm modulo 2 with logarithmic base 3dlg( j)1⁄4 e of an odd residue j, 1 j 2 1, is the minimum exponent e, when it exists, such that j3ej2k 1⁄4 j. Similarly, e1⁄4 dlg(b,M)( j) represents the discrete logarithm modulo M with logarithmic base b of j: jbejM 1⁄4 j. From [2–4], dlg( j) exists whenever j jj82 {1, 3}, and also 0 dlg( j) 2 2 1. Furthermore, for any odd residue j with 1 j 2 1, there is a unique sign, exponent pair (s, e) with s2 {0, 1}, 0 e 2 2 1 such that jð 1Þ 3ej2k 1⁄4 j ð1Þ

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Addition-based exponentiation modulo 2/sup k/ - Electronics Letters

Introduction and background: The basic integer arithmetic operations of addition=subtraction, multiplication and division are implemented typically in hardware using k bits of precision with k usually 16, 32, or 64, and up to 1024 in the case of cryptography. Having a precision limited to k bits makes the arithmetic operations equivalent to their corresponding residue arithmetic modulo 2 operat...

متن کامل

Lookup Structures for Multiplicative Inverses Modulo 2 k

We introduce an inheritance property and related table lookup structures applicable to simplified evaluation of the modular operations “multiplicative inverse”, “discrete log”, and “exponential residue” in the particular modulus 2. Regarding applications, we describe an integer representation system of Benschop for transforming integer multiplications into additions which benefits from our tabl...

متن کامل

Attacking the Elliptic Curve Discrete Logarithm Problem

Definition 1.1. Given a finite abelian group G written multiplicatively and elements b and g in G, the discrete logarithm problem (DLP) consists of finding an integer n such that bn = g, if such an n exists. The difficulty involved in computing the discrete logarithm varies with the choice of G. For example, in the additive group of integers modulo n, (Z/nZ)+, the problem can be solved efficien...

متن کامل

Solving Discrete Logarithms in Smooth-Order Groups with CUDA

This paper chronicles our experiences using CUDA to implement a parallelized variant of Pollard’s rho algorithm to solve discrete logarithms in groups with cryptographically large moduli but smooth order using commodity GPUs. We first discuss some key design constraints imposed by modern GPU architectures and the CUDA framework, and then explain how we were able to implement efficient arbitrary...

متن کامل

The Elliptic Curve Discrete Logarithm Problem: State of the Art

Two public-key families emerged that were commercially viable: 1. RSA (based on integer factorization) 2. Diffie-Hellman/ElGamal (based on the finite field discrete logarithm problem) – 2 RSA Invented by Rivest, Shamir and Adleman in 1977. Security is based on the hardness of the problem of factoring an integer n that is the product of two primes p and q of the same bitlength. In 1985, n could ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001