Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)

نویسنده

  • Michal Wronski
چکیده

In this paper we present a new method for fast scalar multiplication on el-liptic curves over GF (p) in FPGA using Edwards and twisted Edwards curves over GF (p 3). The presented solution works for curves with prime group order (for example for all NIST curves over GF (p)). It is possible because of using 2-isogenous twisted Edwards curves over GF (p 3) instead of using short Weierstrass curves over GF (p) for point scalar multiplication. This problem was considered by Verneuil in [1], but in software solutions it is useless, because multiplication in GF (p 3) is much harder than multiplication in GF (p). Fortunately in hardware solutions it is possible to make in FPGA fast multiplication in GF (p 3) using parallel computations. Single multiplication in GF (p 3) is still a little bit slower than in GF (p) but operations on twisted Edwards curves require less multiplications than operations on short Weierstrass curves. Using these observations results in that scalar multiplication on twisted Edwards curve may be in some situations shorter than scalar multiplication on short Weierstrass curve up to 26%. Moreover, in Edwards and twisted Edwards curves arithmetic it is possible to use uni…ed formula (the same formula for points addition and point doubling) which protects us against some kinds of side channel attacks. We also present full coprocessor for fast scalar multiplication in FPGA using described techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Faster Point Scalar Multiplication on Short Weierstrass Elliptic Curves over Fp using Twisted Hessian Curves over Fp2

This article shows how to use fast Fp2 arithmetic and twisted Hessian curves to obtain faster point scalar multiplication on elliptic curve ESW in short Weierstrass form over Fp . It is assumed that p and #ESW (Fp) are different large primes, #E(Fq) denotes number of points on curve E over field Fq and #E t SW (Fp), where E t is twist of E, is divisible by 3. For example this method is suitable...

متن کامل

Twisted μ4-Normal Form for Elliptic Curves

We introduce the twisted μ4-normal form for elliptic curves, deriving in particular addition algorithms with complexity 9M+ 2S and doubling algorithms with complexity 2M + 5S + 2m over a binary field. Every ordinary elliptic curve over a finite field of characteristic 2 is isomorphic to one in this family. This improvement to the addition algorithm, applicable to a larger class of curves, is co...

متن کامل

A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem

This paper presents implementation results of a reconfigurable elliptic curve processor defined over prime fields GF (p). We use this processor to compare a new algorithm for point addition and point doubling operations on the twisted Edwards curves, against a current standard algorithm in use, namely the Double-and-Add. Secure power analysis versions of both algorithms are also examined and co...

متن کامل

Faster Attacks on Elliptic Curve Cryptosystems

The previously best attack known on elliptic curve cryptosystems used in practice was the parallel collision search based on Pollard's-method. The complexity of this attack is the square root of the prime order of the generating point used. For arbitrary curves, typically deened over GF(p) or GF(2 m), the attack time can be reduced by a factor or p 2, a small improvement. For subbeld curves, th...

متن کامل

FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime

We introduce FourQ, a high-security, high-performance elliptic curve that targets the 128bit security level. At the highest arithmetic level, cryptographic scalar multiplications on FourQ can use a four-dimensional Gallant-Lambert-Vanstone decomposition to minimize the total number of elliptic curve group operations. At the group arithmetic level, FourQ admits the use of extended twisted Edward...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015