Eecient Algorithms for Elliptic Curve Cryptosystems

نویسنده

  • Jorge Guajardo
چکیده

Elliptic curves are the basis for a relative new class of public-key schemes. It is predicted that elliptic curves will replace many existing schemes in the near future. It is thus of great interest to develop algorithms which allow eecient implementations of elliptic curve crypto systems. This thesis deals with such algorithms. EEcient algorithms for elliptic curves can be classiied into low-level algorithms , which deal with arithmetic in the underlying nite eld and high-level algorithms , which operate with the group operation. This thesis describes three new algorithms for eecient implementations of elliptic curve cryptosystems. The rst algorithm describes the application of the Karatsuba-Ofman Algorithm to multiplication in composite elds GF ((2 n) m). The second algorithm deals with eecient inversion in composite Galois elds of the form GF ((2 n) m). The third algorithm is an entirely new approach which accelerates the multiplication of points which is the core operation in elliptic curve public-key systems. The algorithm explores computational advantages by computing repeated point doublings directly through closed formulae rather than from individual point doublings. Finally we apply all three algorithms to an implementation of an elliptic curve system over GF ((2 16) 11). We provide absolute performance measures for the eld operations and for an entire point multiplication. We also show the improvements gained by the new point multiplication algorithm in conjunction with the k-ary and improved k-ary methods for exponentiation. iii Preface This thesis describes the research that I conducted while completing my Master's degree at Worcester Polytechnic Institute. I have attempted to compile as much information related to elliptic curves as it is adequate and relevant to this thesis. I have also tried to be as explicit as possible in the derivation of formulae and theorems. Finally, I hope this work to be of use in both university and industry settings in which elliptic curve cryptosystems are being developed. I would like to thank the following people for their support throughout the months that I worked on this thesis. First, I would like to thank Prof. Paar for all the help, advise, and support that he gave me throughout my graduate work at WPI. I would also like to thank Prof. Paar for the atmosphere of friendship and camaraderie that he developed while working with him. I am grateful to Prof. David Cyganski and Prof. Gabor Sarkozy from Worces-ter Polytechnic Institute and Dr. Robert Dulude …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Eecient Elliptic Curve Exponentiation Using Mixed Coordinates

Elliptic curve cryptosystems, proposed by Koblitz ((12]) and Miller ((16]), can be constructed over a smaller eld of deenition than the ElGamal cryptosystems ((6]) or the RSA cryptosystems ((20]). This is why elliptic curve cryptosystems have begun to attract notice. In this paper, we investigate eecient elliptic curve exponentiation. We propose a new coordinate system and a new mixed coordinat...

متن کامل

Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

Elliptic curve cryptosystems, proposed by Koblitz ((11]) and Miller ((15]), can be constructed over a smaller eld of deenition than the ElGamal cryptosystems ((5]) or the RSA cryptosystems ((19]). This is why elliptic curve cryptosystems have begun to attract notice. In this paper, we investigate eecient elliptic curve exponentiation. We propose a new coordinate system and a new mixed coordinat...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

Applications of elliptic curves in public key cryptography

The most popular public key cryptosystems are based on the problem of factorization of large integers and discrete logarithm problem in finite groups, in particular in the multiplicative group of finite field and the group of points on elliptic curve over finite field. Elliptic curves are of special interest since they at present alow much shorter keys, for the same level of security, compared ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997