Efficient Algorithms for Multi-Scalar Multiplications
نویسندگان
چکیده
Since the internet was made accessible for the public, it is used more and more for the exchange of confidential data. Over the past few years, the number of electronic frauds increased and nowadays poses a serious threat. It is therefore extremely important to have methods to secure transactions and communications made via the internet, or in general in any electronic environment. The science that made security in electronic environments its business is called cryptography. Nowadays, there exist several methods, so-called cryptosystems, which enable users to secure their communications. Due to their tamper resistance and mobility, cryptosystems are often implemented on smart cards. However, since smart cards have only the size of a credit card, their computational power and memory is very limited. It is therefore crucial to compute the operations required by a cryptosystem as efficient as possible. The basic mathematic operation in cryptosystems are scalar multiplications and more general, sums of scalar multiplications, so-called multi-scalar multiplications. This thesis analyzes several methods to compute a multi-scalar multiplication in an efficient way. Here efficient means not only as fast as possible, but also using as little memory as possible. In detail, there exist several basic algorithms to compute a multi-scalar multiplication. The runtime of those algorithms can be decreased if special representations of the scalars are deployed. The emphasis of this thesis is on such representations. This thesis is organized as follows: Chapter 1 introduces the basic concept of cryptography and smart cards. Chapter 2 discusses elliptic curves and their application to cryptography. Chapter 3 introduces the basics about integer representations. Chapter 4 reviews several basic algorithms to compute a multiscalar multiplication and Chapters 5 and 6 introduce special representations of the scalars to speed up those algorithms. In Chapter 7, the author compares those representations and in Chapter 8, he estimates the total computational costs for computing a multi-scalar multiplication. Finally, Chapter 9 states the authors conclusion.
منابع مشابه
Double-Base Number System for Multi-scalar Multiplications
The Joint Sparse Form is currently the standard representation system to perform multi-scalar multiplications of the form [n]P + m[Q]. We introduce the concept of Joint Double-Base Chain, a generalization of the Double-Base Number System to represent simultaneously n and m. This concept is relevant because of the high redundancy of Double-Base systems, which ensures that we can find a chain of ...
متن کاملRefined Computations for Points of the Form 2kP Based on Montgomery Trick
This paper focuses on algorithms for an efficient scalar multiplication. It proposes two algorithms for computing points of the form 2kP in affine coordinates. One works for k = 2, and the other works for an arbitrary natural number k. The efficiency of these algorithms is based on a trade-off between a field inversion and several field multiplications. Montgomery trick is used to implement thi...
متن کاملRevisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves
This paper deals with the protection of elliptic curve scalar multiplications against side-channel analysis by using the atomicity principle. Unlike other atomic patterns, we investigate new formulæ with same cost for both doubling and addition. This choice is particularly well suited to evaluate double scalar multiplications with the Straus-Shamir trick. Since fixed point multiplications highl...
متن کاملEfficient Left-to-Right Multi-Exponentiations
Multi-exponent algorithms are frequently used in cryptographic protocols, for example, digital signature algorithms, some commitment schemes, etc. The previously known efficient algorithms use special exponent recording algorithms like wNAF or the joint sparse form. Those algorithms can only be applied starting at the least significant bit. Therefore, they require additional memory for the reco...
متن کاملFaster Group Operations on Elliptic Curves
This paper improves implementation techniques of Elliptic Curve Cryptography. We introduce new formulae and algorithms for the group law on Jacobi quartic, Jacobi intersection, Edwards, and Hessian curves. The proposed formulae and algorithms can save time in suitable point representations. To support our claims, a cost comparison is made with classic scalar multiplication algorithms using prev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005