A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography
نویسندگان
چکیده
In 1999 Silverman [21] introduced a family of binary finite fields which are composite extensions of F2 and on which arithmetic operations can be performed more quickly than on prime extensions of F2 of the same size. We present here a fast approach to elliptic curve cryptography using a distinguished subset of the set of Silverman fields F2N = Fhn . This approach leads to a theoretical computation speedup over fields of the same size, using a standard point of view (cf. [7]). We also analyse their security against prime extension fields F2p , where p is prime, following the method of Menezes and Qu [12]. We conclude that our fields do not present any significant weakness towards the solution of the elliptic curve discrete logarithm problem and that often the Weil descent of Galbraith-Gaudry-Hess-Smart (GGHS) does not offer a better attack on elliptic curves defined over F2N than on those defined over F2p , with a prime p of the same size as N . A noteworthy example is provided by F2226 : a generic elliptic curve Y 2 + XY = X + αX + β defined over F2226 is as prone to the GGHS Weil descent attack as a generic curve defined on the NIST field F2233 .
منابع مشابه
Efficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields
This paper presents two efficient implementations of fast and pipelined bit-parallel polynomial basis multipliers over GF (2m) by irreducible pentanomials and trinomials. The architecture of the first multiplier is based on a parallel and independent computation of powers of the polynomial variable. In the second structure only even powers of the polynomial variable are used. The par...
متن کاملA Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields
Problem statement: A fundamental building block for digital communication is the Publickey cryptography systems. Public-Key Cryptography (PKC) systems can be used to provide secure communications over insecure channels without exchanging a secret key. Implementing Public-Key cryptography systems is a challenge for most application platforms when several factors have to be considered in selectin...
متن کاملA Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields
Problem statement: A fundamental building block for digital communication is the Publickey cryptography systems. Public-Key Cryptography (PKC) systems can be used to provide secure communications over insecure channels without exchanging a secret key. Implementing Public-Key cryptography systems is a challenge for most application platforms when several factors have to be considered in selectin...
متن کاملMemory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
It has been recently shown that sharing a common coordinate in elliptic curve cryptography implementations improves the performance of scalar multiplication. This paper presents new formulæ for elliptic curves over prime fields that provide efficient point addition and doubling using the Montgomery ladder. All computations are performed in a common projective Z-coordinate representation to redu...
متن کاملRings of Low Multiplicative Complexity and Fast Multiplication in Finite Fields
We survey the rings of low multiplicative complexity and the redundant representation of finite fields. The construction is originally due to Ito and Tsujii [3]. We give the important results of Silverman’s works in [1], [2]. Moreover, we note that the fields constructed with Silverman’s method are not suitable for elliptic curve cryptography while Silverman suggests those curves can be used in...
متن کامل