Point Multiplication using Integer Sub-Decomposition for Elliptic Curve Cryptography

نویسندگان

  • Ruma Kareem K. Ajeena
  • Hailiza Kamarulhaili
چکیده

In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV idea to compute any multiple kP of a point P of order n lying on an elliptic curve E. This approach uses two fast endomorphisms ψ1 and ψ2 of E over prime field Fp to calculate kP. The basic idea of ISD method is to sub-decompose the returned values k1 and k2 lying outside the range √ n from the GLV decomposition of a multiplier k into integers k11,k12,k21 and k22 with − √ n < k11,k12,k21,k22 < √ n. These integers are computed by solving a closest vector problem in lattice. The new proposed algorithms and implementation results are shown and discussed in this study.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2) for ECC protocols

The Elliptic Curve Cryptography covers all relevant asymmetric cryptographic primitives like digital signatures and key agreement algorithms. In the present work, we develop a design of elliptic curve operations over binary Fields GF (2). The function used for this purpose is the scalar multiplication kP which is the core operation of ECCs. Where k is an integer and P is a point on an elliptic ...

متن کامل

Efficient Arithmetic on Koblitz Curves

It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: taking a given integer multiple of a given point on the curve. The cost of the protocols depends on that of the elliptic scalar multiplication operation. Koblitz introduced a family of curves which admit especially fast...

متن کامل

Design and Implementation of Ec Based Cryptosystem on Fpga

As computing and communication devices are equipped with increasingly versatile wireless connection capabilities, the demand for security increases. Cryptography provides a method for securing and authenticating the transmission of information over the insecure channels. Elliptic Curve [EC] Cryptography is a public key cryptography which replaces RSA because of its increased security with lesse...

متن کامل

Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-key Cryptosystems

Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Internet communications. Elliptic curve scalar multiplication in particular, which refers to the operation of multiplying a large integer by a point on an elliptic curve, is crucial for both data encryption technology as well as testing the security of cryptographic systems. The purpose of this project...

متن کامل

Improved Algorithms for Arithmetic on Anomalous Binary Curves ?

It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over nite elds. The basic operation is scalar multiplication: taking a given integer multiple of a given point on the curve. The cost of the protocols depends on that of the elliptic scalar multiplication operation. Koblitz introduced a family of curves which admit especially fast ell...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013