Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography

Author:

Ning Yan-Duan1,Chen Yan-Haw2,Shih Cheng-Sin1,Chu Shao-I1

Affiliation:

1. Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan

2. Department of Information Engineering, I-Shou University, Kaohsiung 840301, Taiwan

Abstract

This paper is aimed at using a lookup table method to improve the scalar multiplication performance of elliptic curve cryptography. The lookup table must be divided into two polynomials and requires two iterations of point doubling operation, for which negation operations are needed. It is well known that an inversion operation requires a lot of multiplication time. The advantage of this paper is that we are able to reduce one inverse element calculation for this problem and also improve the basic operations of finite fields through segmentation methods. If the normal basis method is used in the design of the inverse element operation, it must be converted to the normal basis through the standard basis. However, the conversion process requires a lot of matrix operations. Though the anti-element operation has good speed performance, it also increases the computational complexity. Using number theory and grouping methods will greatly improve the performance of inverse element operations. With application of the two-time point doubling operation in the hardware implementation, the developed approach reduces the computing time by 48% as compared with the conventional approach. The computational time of the scalar multiplication using the presented method is further improved by 67% over the traditional algorithm with only an area increase of 12%. Finally, the proposed lookup table-based technique can be utilized for software and hardware implementation, as the developed arithmetic operations are simple and are consistent in their execution.

Funder

Ministry of Science and Technology, Taiwan

Publisher

MDPI AG

Reference22 articles.

1. Elliptic curve crypto systems;Koblitz;Math. Comput.,1987

2. Miller, V. (1986). Advances in Cryptography-CRYPTO, Springer.

3. Efficient Operations in Large Finite Fields for Elliptic Curve Cryptographic;Chen;Int. J. Eng. Technol. Manag. Res.,2020

4. Speeding Up the Computations on An Elliptic Curve Using Addition-Subtraction Chains;Morain;RAIRO Theor. Inform. Appl.,1990

5. Solinas, J.A. (2001). Low-Weight Binary Representation for Pairs of Integers, Centre for Applied Cryptographic Research, University of Waterloo. Technical Report.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3