Abstract
In this paper we present a new hardware modular multiplication algorithm over the finite extension fieldsGF(p k) where p >2k. We use an alternate polynomial representation of the field elements and a Lagrange like interpolation technique. We describe our algorithm in terms of matrix operations and point out some properties of the matrices that can be used to improve the hardware design. The proposed algorithm is highly parallelizable and seems well suited for hardware implementation of elliptic curve cryptosystems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48 (1987) 203–209
Koblitz, N.: ACou rse in Number Theory and Cryptography. second edn. Volume 114 of Graduate texts in mathematics. Springer-Verlag (1994)
Koblitz, N.: Algebraic aspects of cryptography. Volume 3 of Algorithms and computation in mathematics. Springer-Verlag (1998)
Diffle, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22 (1976) 644–654
Menezes, A. J., Van Oorschot, P.C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA( 1997)
Yanik, T., Savas, E., C. K. Koc: Incomplete reduction in modular arithmetic. IEE Proceedings: Computers and Digital Technique 149 (2002) 46–52
C. K. Koc, Acar, T.: Montgomery multiplication in GF(2k). Designs, Codes and Cryptography 14 (1998) 57–69 275, 276
Halbutogullari, A., C. K. Koc: Parallel multiplication in GF(2k) using polynomial residue arithmetic. Designs, Codes and Cryptography 20 (2000) 155–173
Paar, C., Fleischmann, P., Roelse, P.: Efficient multiplier architectures for galois.elds GF(24n). IEEE Transactions on Computers 47 (1998) 162–170
Bailey, D., Paar, C.: “efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology 14 (2001) 153–176
Montgomery, P. L.: Modular multiplication without trial division. Mathematics of Computation 44 (1985) 519–521 276
Joux, A.: A one round protocol for tripartite Diffle-Hellman. In: 4th International Algorithmic Number Theory Symposium (ANTS-IV. Volume 1838 of Lecture Notes in Computer Science., Springer-Verlag (2000) 385–393 282
Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. In: proceedings of Asiacrypt’01. Volume 2139 of Lecture Notes in Computer Science., Springer-Verlag (2001) 514–532
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bajard, JC., Imbert, L., Négre, C. (2002). Modular Multiplication in GF(pk) Using Lagrange Representation. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_22
Download citation
DOI: https://doi.org/10.1007/3-540-36231-2_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00263-5
Online ISBN: 978-3-540-36231-9
eBook Packages: Springer Book Archive