Skip to main content

Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC

  • Conference paper
Information Security and Cryptology (CISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3822))

Included in the following conference series:

Abstract

Inversion is the costliest of all finite field operations. Some algorithms require computation of several finite field elements simultaneously (elliptic curve factorization for example). Montgomery’s trick is a well known technique for performing the same in a sequential set up with little scope for parallelization. In the current work we propose an algorithm which needs almost same computational resources as Montgomery’s trick, but can be easily parallelized. Our algorithm uses binary tree structures for computation and using 2r − 1 multipliers, it can simultaneously invert 2r elements in 2r multiplication rounds and one inversion round. We also describe how the algorithm can be used when 2, 4, ... number of multipliers are available. To exhibit the utility of the method, we apply it to obtain a parallel algorithm for elliptic curve point multiplication. The proposed method is immune to side-channel attacks and compares favourably to many parallel algorithms existing in literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertoni, G., Breveglieri, L., Wollinger, T.J., Paar, C.: Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. ITCC (2), 538–546 (2004)

    Google Scholar 

  2. Brier, E., Dechene, I., Joye, M.: Unified point addition formulae for elliptic curve cryptosystems. In: Nedjah, N., de Macedo, L. (eds.) Embedded Cryptographic Hardware: Methodolgies & Architectures, Nova Science Publishers, Bombay (2004)

    Google Scholar 

  3. Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335–345. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292–302. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  5. Fischer, W., Giraud, C., Knudsen, E.W., Seifert, J.-P.: Parallel Scalar Multiplication on General Elliptic Curves over F p hedged against Non-Differential Side-Channel Attacks. In: Available at IACR eprint Archive, Technical Report No 2002/007, http://www.eprint.iacr.org

  6. Fong, K., Hankerson, D., Lòpez, J., Menezes, A.: Field inversion and point halving revisited. IEEE Transactions on Computers 53(8), 1047–1059 (2004)

    Article  Google Scholar 

  7. Garcia, J.M.G., Garcia, R.M.: Parallel Algorithm for Multiplication on Elliptic Curves. Cryptology ePrint Archive, Report 2002/179 (2002), Available at http://eprint.iacr.org

  8. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)

    MATH  Google Scholar 

  9. Izu, T., Moller, B., Takagi, T.: Improved elliptic curve multiplication methods resistant against side channel attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 296–313. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 280–296. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  11. Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377–390. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  13. Kocher, P.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  14. Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  15. Lenstra, H.W.: Factoring Integers with Elliptic Curves. Ann. of Math. 126, 649–673 (1987)

    Article  MathSciNet  Google Scholar 

  16. Menezes, A., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  17. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  18. Möller, B.: Personal Communication

    Google Scholar 

  19. Montgomery, P.L.: Speeding The Pollard and Elliptic Curve methods of Factorization. Math. Comp. 48, 243–264 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  20. Oswald, E.: On Side-Channel Attacks and Application of Algorithmic Countermeasures. Ph.D. Thesis, Graz University of Technology, Austria (2003)

    Google Scholar 

  21. Shacham, H., Boneh, D.: Improving SSL handshake performance via batching. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 28. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mishra, P.K. (2005). Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_28

Download citation

  • DOI: https://doi.org/10.1007/11599548_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30855-3

  • Online ISBN: 978-3-540-32424-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics