An Efficient and Scalable Modular Inversion/Division for Public Key Cryptosystems

被引:0
作者
Mrabet, Amine [1 ,5 ,6 ]
El-Mrabet, Nadia [2 ]
Bouallegue, Belgacem [7 ]
Mesnager, Sihem [1 ,4 ,8 ]
Machhout, Mohsen [3 ]
机构
[1] Univ Paris8, St Denis, France
[2] Ecole Mines St Etienne, St Etienne, France
[3] Univ Monastir, E E Lab, Monastir, Tunisia
[4] Univ Paris XIII, CNRS, UMR 7539, LAGA, Villetaneuse, France
[5] Univ Limoges, XLIM, CNRS, UMR 7252,Mathis, Limoges, France
[6] Natl Engn Sch Tunis, Tunis, Tunisia
[7] King Khalid Univ, Abha, Saudi Arabia
[8] Telecom ParisTech, Paris, France
来源
2017 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS) | 2017年
关键词
Modular Inversion; Modular Division; Finite Field; Large Characteristic; ECC; Pairing; Affine coordinate; FPGA; EXPONENTIATION; PAIRINGS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper we describe a design to compute an inversion in F-p as well as division. Inversion can be used in Elliptic Curve Cryptography systems and pairing-based cryptography, which are becoming popular for Public Key Cryptosystems. For the same level of security, ECC and pairing use much smaller key length than RSA but need modular inversion. In ECC when points are represented in so-called affine coordinates, the addition of two points involves a field inversion. Some pairing require one inversion over F-p in order to perform the final exponentiation. Usually, inversions are avoided in Elliptic Curve Cryptography as they are expensive. For example, inversions in affine coordinates are transform into multiplication in Jacobian or projective coordinates. In order to improve performance of Public Key Cryptosystems, we present in this paper an improved algorithm for prime field modular inversion. We demonstrate that affine coordinates can be more efficient than projective or jacobian for the scalar multiplication.
引用
收藏
页数:6
相关论文
共 21 条
  • [1] [Anonymous], LNCS
  • [2] [Anonymous], LNCS
  • [3] [Anonymous], 2016 INT C ENG MIS I
  • [4] [Anonymous], Nist special publication 800-38a. online
  • [5] Bigou Karim, 2015, WORKSH CRYPT HARDW E
  • [6] Bigou Karim, 2015, IMPROVING MODULAR IN
  • [7] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [8] Cohen H., HDB ELLIPTIC HYPEREL
  • [9] de Dormale Guerric Meurice, IMPROVED MONTGOMERY
  • [10] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654