Skip to main content

Redundant Trinomials for Finite Fields of Characteristic 2

  • Conference paper
Book cover Information Security and Privacy (ACISP 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3574))

Included in the following conference series:

Abstract

In this article we introduce redundant trinomials to represent elements of finite fields of characteristic 2. This paper develops applications to cryptography, especially based on elliptic and hyperelliptic curves. After recalling well-known techniques to perform efficient arithmetic in extensions of \(\mathbb{F}_2\), we describe redundant trinomial bases and discuss how to implement them efficiently. They are well suited to build \(\mathbb{F}_{2^n}\) when no irreducible trinomial of degree n exists. Depending on nā€‰āˆˆā€‰[2,10000] tests with NTL show that, in this case, improvements for squaring and exponentiation are respectively up to 45% and 25%. More attention is given to extension degrees relevant for curve-based cryptography. For this range, a scalar multiplication can be sped up by a factor up to 15%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bailey, D.V., Paar, C.: Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of CryptologyĀ 14(3), 153ā€“176 (2001)

    MATHĀ  MathSciNetĀ  Google ScholarĀ 

  2. Brent, R., Zimmermann, P.: Algorithms for finding almost irreducible and almost primitive trinomials. Primes and Misdemeanours: Lectures in Honour of the Sixtieth Birthday of Hugh Cowie Williams, The Fields Institute, Toronto, to be published by the American Mathematical Society. See, http://web.comlab.ox.ac.uk/oucl/work/richard.brent/pd/rpb212.pdf

  3. Brent, R., Zimmermann, P.: Random number generators with period divisible by a mersenne prime. In: Kumar, V., Gavrilova, M.L., Tan, C.J.K., Lā€™Ecuyer, P. (eds.) ICCSA 2003. LNCS, vol.Ā 2667, pp. 1ā€“10. Springer, Heidelberg (2003), See, http://web.comlab.ox.ac.uk/oucl/work/richard.brent/pd/rpb211.pdf

    ChapterĀ  Google ScholarĀ 

  4. Doche, C.: A table of redundant trinomials in characteristic 2 up to the degree 10000. See, http://www.math.u-bordeaux.fr/~cdoche/documents/redundant.gp.gz

  5. Frey, G.: Applications of arithmetical geometry to cryptographic constructions. In: Jungnickel, D., Niederreiter, H. (eds.) Fifth International Conference on Finite Fields and Applications, pp. 128ā€“161. Springer, Berlin (2001)

    Google ScholarĀ 

  6. von zur Gathen, J., Gerhard, J.: Arithmetic and factorization of polynomials over F2 (1996)

    Google ScholarĀ 

  7. von zur Gathen, J., Nƶcker, M.: Polynomial and normal bases for finite fields. To appear

    Google ScholarĀ 

  8. Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. Journal of CryptologyĀ 15(1), 19ā€“46 (2001), Online publication: August 29 (2001)

    ArticleĀ  MATHĀ  MathSciNetĀ  Google ScholarĀ 

  9. Jebelean, T.: An algorithm for exact division. J. Symbolic ComputationĀ 15(2), 169ā€“180 (1993)

    ArticleĀ  MATHĀ  MathSciNetĀ  Google ScholarĀ 

  10. Menezes, A., Qu, M.: Analysis of the Weil descent attack of Gaudry, Hess and Smart. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.Ā 2020, pp. 308ā€“318. Springer, Heidelberg (2001)

    ChapterĀ  Google ScholarĀ 

  11. Seroussi, G.: Table of lowā€“weight binary irreducible polynomials. Technical Report HPLā€“98ā€“135, Hewlettā€“Packard (August 1998)

    Google ScholarĀ 

  12. Shoup, V.: NTL: A Library for doing Number Theory, ver. 5.3.1

    Google ScholarĀ 

  13. Wu, H., Hasan, M.A., Blake, I.F., Gao, S.: Finite field multiplier using redundant representation. IEEE Trans. ComputersĀ 51(11), 1306ā€“1316 (2002)

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doche, C. (2005). Redundant Trinomials for Finite Fields of Characteristic 2. In: Boyd, C., GonzƔlez Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_11

Download citation

  • DOI: https://doi.org/10.1007/11506157_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26547-4

  • Online ISBN: 978-3-540-31684-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics