Fast Elliptic Curve Point Counting Using Gaussian Normal Basis

نویسندگان

  • Hae Young Kim
  • Jung Youl Park
  • Jung Hee Cheon
  • Je Hong Park
  • Jae Heon Kim
  • Sang Geun Hahn
چکیده

In this paper we present an improved algorithm for counting points on elliptic curves over finite fields. It is mainly based on SatohSkjernaa-Taguchi algorithm [SST01], and uses a Gaussian Normal Basis (GNB) of small type t ≤ 4. In practice, about 42% (36% for prime N) of fields in cryptographic context (i.e., for p = 2 and 160 < N < 600) have such bases. They can be lifted from FpN to ZpN in a natural way. From the specific properties of GNBs, efficient multiplication and the Frobenius substitution are available. Thus a fast norm computation algorithm is derived, which runs in O(N log N) with O(N) space, where the time complexity of multiplying two n-bit objects is O(n). As a result, for all small characteristic p, we reduced the time complexity of the SSTalgorithm from O(N) to O(N 2μ+ 1 μ+1 ) and the space complexity still fits in O(N). Our approach is expected to be applicable to the AGM since the exhibited improvement is not restricted to only [SST01].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic curve point counting over finite fields with Gaussian normal basis

In this paper, we present the GNB-aided MSST algorithm for the curves over finite fields that have a Gaussian normal basis of type t ≤ 2. It is based on the MSST algorithm proposed by P. Gaudry [3] at ASIACRYPT 2002. For those fields, we combine the lifting phase of the MSST algorithm and the norm computation algorithm in [6]. So the time complexity of the MSST is reduced from O(N) to O(N) and ...

متن کامل

Design and Implementation of Ec Based Cryptosystem on Fpga

As computing and communication devices are equipped with increasingly versatile wireless connection capabilities, the demand for security increases. Cryptography provides a method for securing and authenticating the transmission of information over the insecure channels. Elliptic Curve [EC] Cryptography is a public key cryptography which replaces RSA because of its increased security with lesse...

متن کامل

Design of Gaussian Normal and Polynomial Basis Multipliers over Gf(2)

This article address efficient hardware implementations for multiplication over GF(2). Hardware implementations of multiplication algorithms are suitable for elliptic curve cryptoprocessor designs, which allow that elliptic curve based cryptosystems implemented in hardware provide more physical security and higher speed than software implementations. In this case, the multipliers were designed ...

متن کامل

Software Multiplication using Normal Bases

Fast algorithms for multiplication in finite fields are required for several cryptographic applications, in particular for implementing elliptic curve operations over the NIST recommended binary fields. In this paper we present new software algorithms for efficient multiplication over the binary field F2m that use a Gaussian normal basis representation. Two approaches are presented, direct norm...

متن کامل

Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis

This paper proposes the implementation of a Elliptic Curve (EC) cryptosystem which is aimed to provide secure stream ciphers, hash functions and key exchange in a time shared manner. The design of hardware efficient stream cipher based on elliptic curves proposes the use of point multiplication block on a time sharing basis for providing secure stream ciphers, hash generation and key exchange. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002