Compact multiplicative inverter for hardware elliptic curve cryptosystem

M. M. Wong, M. L. Dennis Wong, Ka Lok Man

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a compact design of a multiplicative inverter for elliptic curve cryptosystems. Using a methodology based on the composite field arithmetic, we propose a combinatorial solution to mitigate the usage of look up tables as commonly adopted by the conventional software based approach. In particular, we perform further isomorphism in the subfield, such that the required arithmetic are constructed using logical AND and XOR gates only. In this work, we demonstrate our proposed methodology with the field GF((2 8)41) ≅ GF((((22)2) 2)41) in optimal normal type II basis. The chosen field is both secure and results in efficient computation. An analysis of the resultant hardware complexity of our inverter is reported towards the end.

Original languageEnglish
Title of host publicationNetwork and Parallel Computing - 9th IFIP International Conference, NPC 2012, Proceedings
EditorsJ. J. Park, A. Y. Zomaya, S. S. Yeo, S. Sahni
Pages492-499
Number of pages8
ISBN (Electronic)978-3-642-35606-3
DOIs
Publication statusPublished - 2012
Event9th IFIP International Conference on Network and Parallel Computing - Gwangju, Korea, Republic of
Duration: 6 Sep 20128 Sep 2012

Publication series

NameLecture Notes in Computer Science
Volume7513
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th IFIP International Conference on Network and Parallel Computing
Abbreviated titleNPC 2012
CountryKorea, Republic of
CityGwangju
Period6/09/128/09/12

Keywords

  • Composite field arithmetic (CFA)
  • Elliptic curve (EC) cryptosystems
  • Itoh and Tsujii inversion algorithm (ITIA)
  • Multiplicative inversion

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Compact multiplicative inverter for hardware elliptic curve cryptosystem'. Together they form a unique fingerprint.

Cite this