Skip to main content

Modular Multiplication in GF(pk) Using Lagrange Representation

  • Conference paper
  • First Online:
Progress in Cryptology — INDOCRYPT 2002 (INDOCRYPT 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2551))

Included in the following conference series:

  • 541 Accesses

Abstract

In this paper we present a new hardware modular multiplication algorithm over the finite extension fieldsGF(p k) where p >2k. We use an alternate polynomial representation of the field elements and a Lagrange like interpolation technique. We describe our algorithm in terms of matrix operations and point out some properties of the matrices that can be used to improve the hardware design. The proposed algorithm is highly parallelizable and seems well suited for hardware implementation of elliptic curve cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48 (1987) 203–209

    Article  MATH  MathSciNet  Google Scholar 

  2. Koblitz, N.: ACou rse in Number Theory and Cryptography. second edn. Volume 114 of Graduate texts in mathematics. Springer-Verlag (1994)

    Google Scholar 

  3. Koblitz, N.: Algebraic aspects of cryptography. Volume 3 of Algorithms and computation in mathematics. Springer-Verlag (1998)

    Google Scholar 

  4. Diffle, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22 (1976) 644–654

    Article  Google Scholar 

  5. Menezes, A. J., Van Oorschot, P.C., Vanstone, S. A.: Handbook of applied cryptography. CRC Press, 2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA( 1997)

    MATH  Google Scholar 

  6. Yanik, T., Savas, E., C. K. Koc: Incomplete reduction in modular arithmetic. IEE Proceedings: Computers and Digital Technique 149 (2002) 46–52

    Google Scholar 

  7. C. K. Koc, Acar, T.: Montgomery multiplication in GF(2k). Designs, Codes and Cryptography 14 (1998) 57–69 275, 276

    Article  MATH  Google Scholar 

  8. Halbutogullari, A., C. K. Koc: Parallel multiplication in GF(2k) using polynomial residue arithmetic. Designs, Codes and Cryptography 20 (2000) 155–173

    Article  MATH  MathSciNet  Google Scholar 

  9. Paar, C., Fleischmann, P., Roelse, P.: Efficient multiplier architectures for galois.elds GF(24n). IEEE Transactions on Computers 47 (1998) 162–170

    Article  MathSciNet  Google Scholar 

  10. Bailey, D., Paar, C.: “efficient arithmetic in finite field extensions with application in elliptic curve cryptography. Journal of Cryptology 14 (2001) 153–176

    MATH  MathSciNet  Google Scholar 

  11. Montgomery, P. L.: Modular multiplication without trial division. Mathematics of Computation 44 (1985) 519–521 276

    Article  MATH  MathSciNet  Google Scholar 

  12. Joux, A.: A one round protocol for tripartite Diffle-Hellman. In: 4th International Algorithmic Number Theory Symposium (ANTS-IV. Volume 1838 of Lecture Notes in Computer Science., Springer-Verlag (2000) 385–393 282

    Google Scholar 

  13. Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. In: proceedings of Asiacrypt’01. Volume 2139 of Lecture Notes in Computer Science., Springer-Verlag (2001) 514–532

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bajard, JC., Imbert, L., Négre, C. (2002). Modular Multiplication in GF(pk) Using Lagrange Representation. In: Menezes, A., Sarkar, P. (eds) Progress in Cryptology — INDOCRYPT 2002. INDOCRYPT 2002. Lecture Notes in Computer Science, vol 2551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36231-2_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-36231-2_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00263-5

  • Online ISBN: 978-3-540-36231-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics