Skip to main content

Inversion in Finite Fields and Rings

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 349 Accesses

The need to compute the multiplicative inverse of an element of a finite field (or Galois field) or of a finite ring occurs frequently in cryptography. The main application domains are asymmetric cryptosystems, for instance in the computation of the private-public key pair in RSA (see RSA public key encryption schems) or in the group operation of elliptic curve cryptosystems. The finite structures in asymmetric algorithms are typically and relatively large. A second application domains are inversions in small finite fields which occur in the context of block ciphers, e.g., within the S-box of the Advanced Encryption Standard (Rijndael/AES).

In the case of inversion in a finite integer ring or polynomial ring, the extended Euclidean algorithm can be used. Let u be the element whose inverse is to be computed and v the modulus. Note that u and v must be relatively prime in order for the inverse to exist. The extended Euclidean algorithm computes the coefficients s and t such that: \(us +...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Guajardo, J. and C. Paar (2002). “Itoh–Tsujii Inversion in standard basis and its application in cryptography and codes.” Designs, Codes and Cryptography, 25, 207–216.

    Article  MATH  MathSciNet  Google Scholar 

  2. Itoh, T. and S. Tsujii (1988). “A fast algorithm for computing multiplicative inverses in GF2(m) using normal bases.” Information and Computation, 78, 171–177.

    Article  MATH  MathSciNet  Google Scholar 

  3. Morii, M. and M. Kasahara (1989). “Efficient construction of gate circuit for computing multiplicative inverses over GF2(m).” Trans. of the IEICE, E 72, 37–42.

    Google Scholar 

  4. Paar, C. (1995). “Some remarks on efficient inversion in finite fields.” 1995 IEEE International Symposium on Information Theory, Whistler, B.C. Canada 58.

    Chapter  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Paar, C. (2005). Inversion in Finite Fields and Rings. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_207

Download citation

Publish with us

Policies and ethics