Abstract
Inversion is the costliest of all finite field operations. Some algorithms require computation of several finite field elements simultaneously (elliptic curve factorization for example). Montgomery’s trick is a well known technique for performing the same in a sequential set up with little scope for parallelization. In the current work we propose an algorithm which needs almost same computational resources as Montgomery’s trick, but can be easily parallelized. Our algorithm uses binary tree structures for computation and using 2r − 1 multipliers, it can simultaneously invert 2r elements in 2r multiplication rounds and one inversion round. We also describe how the algorithm can be used when 2, 4, ... number of multipliers are available. To exhibit the utility of the method, we apply it to obtain a parallel algorithm for elliptic curve point multiplication. The proposed method is immune to side-channel attacks and compares favourably to many parallel algorithms existing in literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bertoni, G., Breveglieri, L., Wollinger, T.J., Paar, C.: Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems. ITCC (2), 538–546 (2004)
Brier, E., Dechene, I., Joye, M.: Unified point addition formulae for elliptic curve cryptosystems. In: Nedjah, N., de Macedo, L. (eds.) Embedded Cryptographic Hardware: Methodolgies & Architectures, Nova Science Publishers, Bombay (2004)
Brier, É., Joye, M.: Weierstraß elliptic curves and side-channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335–345. Springer, Heidelberg (2002)
Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292–302. Springer, Heidelberg (1999)
Fischer, W., Giraud, C., Knudsen, E.W., Seifert, J.-P.: Parallel Scalar Multiplication on General Elliptic Curves over F p hedged against Non-Differential Side-Channel Attacks. In: Available at IACR eprint Archive, Technical Report No 2002/007, http://www.eprint.iacr.org
Fong, K., Hankerson, D., Lòpez, J., Menezes, A.: Field inversion and point halving revisited. IEEE Transactions on Computers 53(8), 1047–1059 (2004)
Garcia, J.M.G., Garcia, R.M.: Parallel Algorithm for Multiplication on Elliptic Curves. Cryptology ePrint Archive, Report 2002/179 (2002), Available at http://eprint.iacr.org
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Izu, T., Moller, B., Takagi, T.: Improved elliptic curve multiplication methods resistant against side channel attacks. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 296–313. Springer, Heidelberg (2002)
Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 280–296. Springer, Heidelberg (2002)
Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377–390. Springer, Heidelberg (2001)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203–209 (1987)
Kocher, P.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Lenstra, H.W.: Factoring Integers with Elliptic Curves. Ann. of Math. 126, 649–673 (1987)
Menezes, A., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Möller, B.: Personal Communication
Montgomery, P.L.: Speeding The Pollard and Elliptic Curve methods of Factorization. Math. Comp. 48, 243–264 (1987)
Oswald, E.: On Side-Channel Attacks and Application of Algorithmic Countermeasures. Ph.D. Thesis, Graz University of Technology, Austria (2003)
Shacham, H., Boneh, D.: Improving SSL handshake performance via batching. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, p. 28. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mishra, P.K. (2005). Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. In: Feng, D., Lin, D., Yung, M. (eds) Information Security and Cryptology. CISC 2005. Lecture Notes in Computer Science, vol 3822. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599548_28
Download citation
DOI: https://doi.org/10.1007/11599548_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30855-3
Online ISBN: 978-3-540-32424-9
eBook Packages: Computer ScienceComputer Science (R0)