Another Look at Inversions over Binary Fields
|
|
- Lenard Shelton
- 5 years ago
- Views:
Transcription
1 Another Look at Inversions over Binary Fields Vassil Dimitrov 1 Kimmo Järvinen 2 1 Department of Electrical and Computer Engineering University of Calgary, Canada 2 Department of Information and Computer Science Aalto University, School of Science, Finland
2 Inversion with Fermat s Little Theorem Multiplicative inverse: Given A 0 GF(2 m ), find A 1 such that A 1 A = 1 A 2m 1 = 1 for all A 0 GF (2 m ) A 1 = A 2m 2 A 2(2m 1 1) = A 2( m 2 ) Standard exponentiation A 2( m 2) = B B 2 B B 2m 2 where B = A 2 m 2 multiplications m 1 squarings 2/23
3 Itoh-Tsujii Introduced by Itoh and Tsujii in 1988 { m 2 (1 + 2)( m 3 ), if m 1 even = 1 + 2(1 + 2)( m 4 ), if m 1 odd Example GF (2 31 ): = (1 + 2)( ( )( ( )( ( )))) 7 multiplications, 30 squarings In general log(m 1) + H(m 1) 1 multiplications m 1 squarings 3/23
4 Matrix Polynomial I + A + A A N 1 A problem that has significance in graph theory and signal processing Minimize the number of matrix multiplications in computing G(N, A) = I + A + A A N 1 Dimitrov and Cooklev(1995): (I + A + A 3 ) G( N/3, A 3 ) if N = 0 or 3 (mod 6) I + (A + A 2 + A 3 ) G( N/3, A 3 ) if N = 1 or 4 (mod 6) G(N, A) = (I + A) G( N/2, A 2 ) if N = 2 (mod 6) I + (A + A 2 ) G( N/2, A 2 ) if N = 5 (mod 6) 4/23
5 The New Algorithm Idea Use the same approach for m 2 but try to minimize the number of additions (which imply multiplications in an inversion) Double-base with bases {2, 3}: m 2 = ( ) ( m 4 ) if m 1 = 0, 3 (mod 6) (1 + 2) ( m 3 ) if m 1 = 2, 4 (mod 6) 1 + ( ) ( m 4 ) if m 1 = 1, 5 (mod 6) For triple-base version with bases {2, 3, 5}, we extend this with: ((1 + 2)( ) )( m 6 ) if m 1 = 0 (mod 5) 5/23
6 The New Algorithm vs. Itoh-Tsujii Average number of multiplications: 1.5 log(m 1) for IT 1.42 log(m 1) for {2, 3} 1.39 log(m 1) for {2, 3, 5} For fields GF (2 m ), 1 m 1023: 18 (1.8 %): {2, 3} is the best 109 (10.7 %): {2, 3, 5} is the best 387 (37.8 %): {2, 3} and {2, 3, 5} are the best 79 (7.7 %): IT is the best 430 (42.0 %): All are equally good We are better for 50.2 % and worse for 7.7 % of the cases 6/23
7 The NIST Fields Itoh-Tsujii: GF(2 163 ) GF(2 233 ) GF(2 283 ) GF (2 409 ) GF(2 571 ) The best from both {2, 3} and {2, 3, 5}: GF(2 163 ) GF(2 233 ) GF(2 283 ) GF (2 409 ) GF(2 571 ) /23
8 Some Other Practical Implications Fewer (even by one) multiplications make a large difference and, therefore, practically all work so far has concentrated on them. Although multiplications usually dominate the costs of inversions, other aspects should not be over-looked Temporary variables Squarings 8/23
9 Temporary Variables 9/23
10 How Are Inversions Computed? GF (2 31 ) : A 1 = A = A 2(230 1) = A 2( ) = ( )( )( ( )( )) 10/23
11 How Are Inversions Computed? GF (2 31 ) : A 1 = A = A 2(230 1) = A 2( ) = ( )( )( ( )( )) 1 B A 1 10/23
12 How Are Inversions Computed? GF (2 31 ) : A 1 = A = A 2(230 1) = A 2( ) = ( )( )( ( )( )) B A 1 C B 1 B B C B B (C 1) 10/23
13 How Are Inversions Computed? GF (2 31 ) : A 1 = A = A 2(230 1) = A 2( ) = ( )( )( ( )( )) B A 1 C B 1 B B C B B (C 1) B B (B 3) 10/23
14 How Are Inversions Computed? GF (2 31 ) : A 1 = A = A 2(230 1) = A 2( ) = ( )( )( ( )( )) B A 1 C B 1 B B C B B (C 1) B B (B 3) C B B B (B 6) B B (B 12) B C (B 6) return B = A 1 10/23
15 Number of Variables (1 + 2 k ) No additional variables (1 + 2 k + 2 2k ) One short-time variable ((1 + 2 k )( k ) + 2 4k ) One short-time variable k (1 + 2 k ) One long-time variable For IT, the number of variables V is the number of k (1 + 2 k ) terms; i.e. V = H(m 1) 1 For us, V is the number of k (1 + 2 k ) terms in the decomposition plus one if we have at least one (1 + 2 k + 2 2k ) or ((1 + 2 k )( k ) + 2 4k ) after the last k (1 + 2 k ) term. The average number of long-time variables is 0.5 log(m 1) for IT and about log(m 1) for us 11/23
16 Results Temporary variables m IT Our 12/23
17 Results (cont.) 6 Difference (variables) Our is better IT is better m 13/23
18 Summary We save on average one variable for GF(2 m ), 1 m 1023 For some fields we save 5 variables and for some we lose by 2 The fields for which we are losing are always those for which we need more multiplications 14/23
19 Squarings 15/23
20 Motivation Example An inversion over GF(2 163 ) requires: 9 multiplications and 162 squarings. Modern HW implementations of ECC use fast multipliers and squarings start to dominate: M = 163 Squarings take 10% of the time (162 vs. 1467) M = 15 Squarings take 55% of the time (162 vs. 135) M = 4 Squarings take 82% of the time (162 vs. 36) M = 1 Squarings take 95% of the time (162 vs. 9) OK but the number of squarings is m 1 = 162 for both IT and the new algorithm. 16/23
21 Squarings Normal Basis An element A GF(2 m ) is given by A = m 1 i=0 a iβ 2i. Then, A 2s = A s (cyclic shift). Polynomial Basis An element A GF(2 m ) is given by A = m 1 i=0 a ix i. Then, A 2 = m 1 i=0 a ix 2i mod p(x) and 1 q (s) 0,1... q (s) 0,m 1 0 q (s) A 2s = 1,1... q (s) 1,m q (s) m 1,1... q (s) m 1,m 1 a 0 a 1. a m 1 17/23
22 Repeated Squarer (Normal Basis / HW) A repeated squarer is a component that can compute A 2s for all s S with the same latency (one clock cycle) In normal basis, repeated squarers are simply m-bit C-to-1 multiplexers where C is the cardinality of S Example A repeated squarer with S = {1, 2, 3} is a 3-to-1 multiplexer: 1 A 2 3 A 2s s 18/23
23 The Problem Let E = (e 1, e 2,..., e N ) be the sequence of exponents required for repeated squarings during an inversion. One needs a set S = {s 1, s 2,..., s C } with cardinality C such that all exponents e i in E can be represented as a sum e i = s j (i) 1 + s j (i) 2 in order to compute the inversion s j (i) k i The problem The task is to find S opt that minimizes the sum L = N i=1 k i among all S with cardinality C satisfying the above condition. Exhaustive search because the search space is small(ish) 19/23
24 Example: The NIST Field GF(2 163 ) Itoh-Tsujii = (1 + 2)( ( )( )( )( )( ( )( ))) E = (1, 1, 2, 4, 8, 16, 32, 64, 32, 2) Our algorithm = ( )( )( )( )( ) E = (1, 1, 1, 3, 3, 9, 9, 27, 27, 81) 20/23
25 Example: The NIST Field GF(2 163 ) (cont.) With different C, S opt and L are as follows: IT Our E (1, 1, 2, 4, 8, 16, 32, 64, 32, 2) (1, 1, 1, 3, 3, 9, 9, 27, 27, 81) C = 1 {1}, 162 {1}, 162 C = 2 {1, 16}, 27 {1, 9}, 26 C = 3 {1, 4, 32}, 17 {1, 3, 27}, 16 C = 4 {1, 2, 8, 32}, 13 {1, 3, 9, 27}, 12 C = 5 {1, 2, 4, 8, 32}, 12 {1, 3, 9, 27, 81}, 10 C = 6 {1, 2, 4, 8, 16, 32}, 11 C = 7 {1, 2, 4, 8, 16, 32, 64}, 10 We have a smaller latency when C > 1 We can use smaller repeated squarers (multiplexers) to get the same latency 21/23
26 Summary If repeated squarings with polynomial basis are computed by using precomputed matrices, then the same technique applies and we need less precomputed matrices and/or use them fewer times during an inversion Similar behavior can be seen for other NIST fields, too. (except for GF(2 233 ) when IT and our algorithm give the same decompositions) More general cases are still to be investigated 22/23
27 Conclusions A new algorithm for inversion in GF(2 m ) that has provably lower number of multiplications compared to the popular IT and outperforms it in about half of the cases for 1 m 1023 The algorithm has some nice by-products that may be important in some implementations 23/23
28 Conclusions A new algorithm for inversion in GF(2 m ) that has provably lower number of multiplications compared to the popular IT and outperforms it in about half of the cases for 1 m 1023 The algorithm has some nice by-products that may be important in some implementations Thank you! Questions? 23/23
ABHELSINKI UNIVERSITY OF TECHNOLOGY
On Repeated Squarings in Binary Fields Kimmo Järvinen Helsinki University of Technology August 14, 2009 K. Järvinen On Repeated Squarings in Binary Fields 1/1 Introduction Repeated squaring Repeated squaring:
More informationOptimal Extension Field Inversion in the Frequency Domain
Optimal Extension Field Inversion in the Frequency Domain Selçuk Baktır, Berk Sunar WPI, Cryptography & Information Security Laboratory, Worcester, MA, USA Abstract. In this paper, we propose an adaptation
More informationAre standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic
More informationHybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography
Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography Jithra Adikari, Student Member, IEEE, Vassil Dimitrov, and Laurent Imbert Abstract Multi-exponentiation is a common
More informationContinuing discussion of CRC s, especially looking at two-bit errors
Continuing discussion of CRC s, especially looking at two-bit errors The definition of primitive binary polynomials Brute force checking for primitivity A theorem giving a better test for primitivity Fast
More informationGF(2 m ) arithmetic: summary
GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation
More informationEECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs)
EECS150 - igital esign Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Nov 21, 2002 John Wawrzynek Fall 2002 EECS150 Lec26-ECC Page 1 Outline Error detection using parity Hamming
More informationChapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations
Chapter 9 Mathematics of Cryptography Part III: Primes and Related Congruence Equations Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 9.1 Chapter 9 Objectives
More informationA Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series
A Parallel Method for the Computation of Matrix Exponential based on Truncated Neumann Series V. S. Dimitrov 12, V. Ariyarathna 3, D. F. G. Coelho 1, L. Rakai 1, A. Madanayake 3, R. J. Cintra 4 1 ECE Department,
More information2.2 BEGINS: POLYNOMIAL
CHAPTER 2.2 HIGHER DEGREE POLY S 2.2 BEGINS: POLYNOMIAL Graphs of Polynomial Functions Polynomial functions are continuous. What this means to us is that the graphs of polynomial functions have no breaks,
More informationTheoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs
Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Department of Computer Science and Engineering
More informationDiscrete Logarithm Problem
Discrete Logarithm Problem Çetin Kaya Koç koc@cs.ucsb.edu (http://cs.ucsb.edu/~koc/ecc) Elliptic Curve Cryptography lect08 discrete log 1 / 46 Exponentiation and Logarithms in a General Group In a multiplicative
More informationArithmetic in Integer Rings and Prime Fields
Arithmetic in Integer Rings and Prime Fields A 3 B 3 A 2 B 2 A 1 B 1 A 0 B 0 FA C 3 FA C 2 FA C 1 FA C 0 C 4 S 3 S 2 S 1 S 0 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 71 Contents Arithmetic in Integer
More informationBSIDES multiplication, squaring is also an important
1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in
More informationLow complexity bit-parallel GF (2 m ) multiplier for all-one polynomials
Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School
More information5.1 Polynomial Functions
5.1 Polynomial Functions In this section, we will study the following topics: Identifying polynomial functions and their degree Determining end behavior of polynomial graphs Finding real zeros of polynomial
More informationLecture 11 - Basic Number Theory.
Lecture 11 - Basic Number Theory. Boaz Barak October 20, 2005 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that a divides b,
More informationMathematics of Cryptography
UNIT - III Mathematics of Cryptography Part III: Primes and Related Congruence Equations 1 Objectives To introduce prime numbers and their applications in cryptography. To discuss some primality test algorithms
More informationSubquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach
Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team
More informationChapter 8. Exploring Polynomial Functions. Jennifer Huss
Chapter 8 Exploring Polynomial Functions Jennifer Huss 8-1 Polynomial Functions The degree of a polynomial is determined by the greatest exponent when there is only one variable (x) in the polynomial Polynomial
More informationCOMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162
COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication
More informationCounting Prime Numbers with Short Binary Signed Representation
Counting Prime Numbers with Short Binary Signed Representation José de Jesús Angel Angel and Guillermo Morales-Luna Computer Science Section, CINVESTAV-IPN, Mexico jjangel@computacion.cs.cinvestav.mx,
More informationDirect Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes. Daniel Augot and Matthieu Finiasz
Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes Daniel Augot and Matthieu Finiasz Context Diffusion layers in a block cipher/spn should: obviously, offer good diffusion,
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationORDERS OF ELEMENTS IN A GROUP
ORDERS OF ELEMENTS IN A GROUP KEITH CONRAD 1. Introduction Let G be a group and g G. We say g has finite order if g n = e for some positive integer n. For example, 1 and i have finite order in C, since
More informationLow-Resource and Fast Elliptic Curve Implementations over Binary Edwards Curves
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-2016 Low-Resource and Fast Elliptic Curve Implementations over Binary Edwards Curves Brian Koziel bck6520@rit.edu
More informationLinear Feedback Shift Registers (LFSRs) 4-bit LFSR
Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple shift-registers with a small number of xor gates. Used for: random number generation
More informationA new class of irreducible pentanomials for polynomial based multipliers in binary fields
Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 10 Page 1 of 8 Number theory (Chapter 4) Review Questions: 1. Does 5 1? Does 1 5? 2. Does (129+63) mod 10 = (129 mod 10)+(63 mod 10)? 3. Does (129+63) mod 10 = ((129 mod 10)+(63
More informationUNDERSTANDING THE COST OF GROVER'S ALGORITHM FOR FINDING A SECRET KEY
UNDERSTANDING THE COST OF GROVER'S ALGORITHM FOR FINDING A SECRET KEY Rainer Steinwandt 1,2 Florida Atlantic University, USA (joint work w/ B. Amento, M. Grassl, B. Langenberg 2, M. Roetteler) 1 supported
More informationParallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials
Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez 1, Guillermo Morales-Luna 1, Nazar A. Saqib 2 and Nareli Cruz-Cortés 1 (1) Computer
More informationOutline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.
Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check
More informationFPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Dimitrov 1, K.U. Järvinen 2, M.J. Jacobson, Jr. 3, W.F. Chan 3, and Z. Huang 1 1 Department of Electrical and
More informationEvaluate and Graph Polynomial Functions
Evaluate and Graph Polynomial Functions Section 2.2 How do you identify and evaluate polynomial functions? What is synthetic substitution? How do you graph polynomial functions? Polynomial Function f(x)
More informationSubquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation
Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a k for some integer k. Notation
More informationBasic elements of number theory
Cryptography Basic elements of number theory Marius Zimand 1 Divisibility, prime numbers By default all the variables, such as a, b, k, etc., denote integer numbers. Divisibility a 0 divides b if b = a
More informationFactoring Algorithms Pollard s p 1 Method. This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors.
Factoring Algorithms Pollard s p 1 Method This method discovers a prime factor p of an integer n whenever p 1 has only small prime factors. Input: n (to factor) and a limit B Output: a proper factor of
More informationSmall FPGA-Based Multiplication-Inversion Unit for Normal Basis over GF(2 m )
1 / 19 Small FPGA-Based Multiplication-Inversion Unit for Normal Basis over GF(2 m ) Métairie Jérémy, Tisserand Arnaud and Casseau Emmanuel CAIRN - IRISA July 9 th, 2015 ISVLSI 2015 PAVOIS ANR 12 BS02
More informationSubquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases
1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz
More informationL9: Galois Fields. Reading material
L9: Galois Fields Reading material Muzio & Wesselkamper Multiple-valued switching theory, p. 3-5, - 4 Sasao, Switching theory for logic synthesis, pp. 43-44 p. 2 - Advanced Logic Design L9 - Elena Dubrova
More informationProof: Let the check matrix be
Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion
More information2-2: Evaluate and Graph Polynomial Functions
2-2: Evaluate and Graph Polynomial Functions What is a polynomial? -A monomial or sum of monomials with whole number exponents. Degree of a polynomial: - The highest exponent of the polynomial How do we
More informationLecture notes: Algorithms for integers, polynomials (Thorsten Theobald)
Lecture notes: Algorithms for integers, polynomials (Thorsten Theobald) 1 Euclid s Algorithm Euclid s Algorithm for computing the greatest common divisor belongs to the oldest known computing procedures
More informationSect 2.4 Multiplying and Dividing Integers
55 Sect 2.4 Multiplying and Dividing Integers Objective a: Understanding how to multiply two integers. To see how multiplying and dividing a negative and a positive number works, let s look at some examples.
More informationECEN 5682 Theory and Practice of Error Control Codes
ECEN 5682 Theory and Practice of Error Control Codes Introduction to Algebra University of Colorado Spring 2007 Motivation and For convolutional codes it was convenient to express the datawords and the
More informationRSA Implementation. Oregon State University
RSA Implementation Çetin Kaya Koç Oregon State University 1 Contents: Exponentiation heuristics Multiplication algorithms Computation of GCD and Inverse Chinese remainder algorithm Primality testing 2
More informationSieve-based factoring algorithms
Sieve-based factoring algorithms From bicycle chains to number fields Eran Tromer tromer@wisdom.weizmann.ac.il Weizmann Institute of Science Sieve-based factoring p.1/23 Factoring by square root extraction
More informationFaster ECC over F 2. (feat. PMULL)
Faster ECC over F 2 571 (feat. PMULL) Hwajeong Seo 1 Institute for Infocomm Research (I2R), Singapore hwajeong84@gmail.com Abstract. In this paper, we show efficient elliptic curve cryptography implementations
More informationEECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates
EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs April 16, 2009 John Wawrzynek Spring 2009 EECS150 - Lec24-blocks Page 1 Cross-coupled NOR gates remember, If both R=0 & S=0, then
More informationA field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:
Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under
More informationReducing the Complexity of Normal Basis Multiplication
Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper
More informationName (print): Question 4. exercise 1.24 (compute the union, then the intersection of two sets)
MTH299 - Homework 1 Question 1. exercise 1.10 (compute the cardinality of a handful of finite sets) Solution. Write your answer here. Question 2. exercise 1.20 (compute the union of two sets) Question
More informationA) (-1, -1, -2) B) No solution C) Infinite solutions D) (1, 1, 2) A) (6, 5, -3) B) No solution C) Infinite solutions D) (1, -3, -7)
Algebra st Semester Final Exam Review Multiple Choice. Write an equation that models the data displayed in the Interest-Free Loan graph that is provided. y = x + 80 y = -0x + 800 C) y = 0x 00 y = 0x +
More information17 Galois Fields Introduction Primitive Elements Roots of Polynomials... 8
Contents 17 Galois Fields 2 17.1 Introduction............................... 2 17.2 Irreducible Polynomials, Construction of GF(q m )... 3 17.3 Primitive Elements... 6 17.4 Roots of Polynomials..........................
More informationOutline. Criteria of good signal sets. Interleaved structure. The main results. Applications of our results. Current work.
Outline Criteria of good signal sets Interleaved structure The main results Applications of our results Current work Future work 2 He Panario Wang Interleaved sequences Criteria of a good signal set We
More informationA 2-error Correcting Code
A 2-error Correcting Code Basic Idea We will now try to generalize the idea used in Hamming decoding to obtain a linear code that is 2-error correcting. In the Hamming decoding scheme, the parity check
More informationCombinatorial Enumeration. Jason Z. Gao Carleton University, Ottawa, Canada
Combinatorial Enumeration Jason Z. Gao Carleton University, Ottawa, Canada Counting Combinatorial Structures We are interested in counting combinatorial (discrete) structures of a given size. For example,
More informationPart IV. Rings and Fields
IV.18 Rings and Fields 1 Part IV. Rings and Fields Section IV.18. Rings and Fields Note. Roughly put, modern algebra deals with three types of structures: groups, rings, and fields. In this section we
More informationSpeeding up characteristic 2: I. Linear maps II. The Å(Ò) game III. Batching IV. Normal bases. D. J. Bernstein University of Illinois at Chicago
Speeding up characteristic 2: I. Linear maps II. The Å(Ò) game III. Batching IV. Normal bases D. J. Bernstein University of Illinois at Chicago NSF ITR 0716498 Part I. Linear maps Consider computing 0
More informationDiscrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 8
CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Note 8 Polynomials Polynomials constitute a rich class of functions which are both easy to describe and widely applicable in
More informationan author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)
More informationExponentiation and Point Multiplication. Çetin Kaya Koç Spring / 70
Exponentiation and Point Multiplication 1 2 3 4 5 6 8 7 10 9 12 16 14 11 13 15 20 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 70 Contents Exponentiation and Point Multiplication Exponentiation and
More informationProof by Contradiction
Proof by Contradiction MAT231 Transition to Higher Mathematics Fall 2014 MAT231 (Transition to Higher Math) Proof by Contradiction Fall 2014 1 / 12 Outline 1 Proving Statements with Contradiction 2 Proving
More informationDiscrete logarithm and related schemes
Discrete logarithm and related schemes Martin Stanek Department of Computer Science Comenius University stanek@dcs.fmph.uniba.sk Cryptology 1 (2017/18) Content Discrete logarithm problem examples, equivalent
More informationSolutions to Practice Final
s to Practice Final 1. (a) What is φ(0 100 ) where φ is Euler s φ-function? (b) Find an integer x such that 140x 1 (mod 01). Hint: gcd(140, 01) = 7. (a) φ(0 100 ) = φ(4 100 5 100 ) = φ( 00 5 100 ) = (
More informationREDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2
REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The
More informationA. Algebra and Number Theory
A. Algebra and Number Theory Public-key cryptosystems are based on modular arithmetic. In this section, we summarize the concepts and results from algebra and number theory which are necessary for an understanding
More informationIdentify polynomial functions
EXAMPLE 1 Identify polynomial functions Decide whether the function is a polynomial function. If so, write it in standard form and state its degree, type, and leading coefficient. a. h (x) = x 4 1 x 2
More informationHardware implementations of ECC
Hardware implementations of ECC The University of Electro- Communications Introduction Public- key Cryptography (PKC) The most famous PKC is RSA and ECC Used for key agreement (Diffie- Hellman), digital
More informationLecture 12. Block Diagram
Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data
More informationNumber Tree LCM HCF Divisibility Rules Power cycle Remainder Theorem Remainder of powers a n b n Last and Second last digit Power of Exponents Euler s
Vedic Numbers Number Tree LCM HCF Divisibility Rules Power cycle Remainder Theorem Remainder of powers a n b n Last and Second last digit Power of Exponents Euler s Theorem Fermet s Theory Wilson Theorem
More informationECEN 5022 Cryptography
Elementary Algebra and Number Theory University of Colorado Spring 2008 Divisibility, Primes Definition. N denotes the set {1, 2, 3,...} of natural numbers and Z denotes the set of integers {..., 2, 1,
More informationOutline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael
Outline CPSC 418/MATH 318 Introduction to Cryptography Advanced Encryption Standard Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in
More informationProbabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford
Probabilistic Model Checking Michaelmas Term 2011 Dr. Dave Parker Department of Computer Science University of Oxford Probabilistic model checking System Probabilistic model e.g. Markov chain Result 0.5
More information1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2
Contents 1 Recommended Reading 1 2 Public Key/Private Key Cryptography 1 2.1 Overview............................................. 1 2.2 RSA Algorithm.......................................... 2 3 A Number
More informationA New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases
A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,
More informationWinter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod. Assignment #2
0368.3049.01 Winter 2008 Introduction to Modern Cryptography Benny Chor and Rani Hod Assignment #2 Published Sunday, February 17, 2008 and very slightly revised Feb. 18. Due Tues., March 4, in Rani Hod
More informationDiscrete Mathematics U. Waterloo ECE 103, Spring 2010 Ashwin Nayak May 17, 2010 Recursion
Discrete Mathematics U. Waterloo ECE 103, Spring 2010 Ashwin Nayak May 17, 2010 Recursion During the past week, we learnt about inductive reasoning, in which we broke down a problem of size n, into one
More information3.9 Is This The End? A Solidify Understanding Task
3.9 Is This The End? A Solidify Understanding Task In previous mathematics courses, you have compared and analyzed growth rates of polynomial (mostly linear and quadratic) and exponential functions. In
More informationCommutative Rings and Fields
Commutative Rings and Fields 1-22-2017 Different algebraic systems are used in linear algebra. The most important are commutative rings with identity and fields. Definition. A ring is a set R with two
More informationCPE 776:DATA SECURITY & CRYPTOGRAPHY. Some Number Theory and Classical Crypto Systems
CPE 776:DATA SECURITY & CRYPTOGRAPHY Some Number Theory and Classical Crypto Systems Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Some Number Theory
More informationScalar Multiplication on Koblitz Curves using
Scalar Multiplication on Koblitz Curves using τ 2 NAF Sujoy Sinha Roy 1, Chester Rebeiro 1, Debdeep Mukhopadhyay 1, Junko Takahashi 2 and Toshinori Fukunaga 3 1 Dept. of Computer Science and Engineering
More informationFast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System
Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System Jithra Adikari, Vassil S. Dimitrov, and Pradeep Mishra Department of Electrical and
More informationEE512: Error Control Coding
EE51: Error Control Coding Solution for Assignment on BCH and RS Codes March, 007 1. To determine the dimension and generator polynomial of all narrow sense binary BCH codes of length n = 31, we have to
More information8 Elliptic Curve Cryptography
8 Elliptic Curve Cryptography 8.1 Elliptic Curves over a Finite Field For the purposes of cryptography, we want to consider an elliptic curve defined over a finite field F p = Z/pZ for p a prime. Given
More informationDiscrete Logarithm Problem
Discrete Logarithm Problem Finite Fields The finite field GF(q) exists iff q = p e for some prime p. Example: GF(9) GF(9) = {a + bi a, b Z 3, i 2 = i + 1} = {0, 1, 2, i, 1+i, 2+i, 2i, 1+2i, 2+2i} Addition:
More informationGeneralized Lucas Sequences Part II
Introduction Generalized Lucas Sequences Part II Daryl DeFord Washington State University February 4, 2013 Introduction Èdouard Lucas: The theory of recurrent sequences is an inexhaustible mine which contains
More informationFPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers
FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)
More informationAlgebra. Modular arithmetic can be handled mathematically by introducing a congruence relation on the integers described in the above example.
Coding Theory Massoud Malek Algebra Congruence Relation The definition of a congruence depends on the type of algebraic structure under consideration Particular definitions of congruence can be made for
More informationError Correction Review
Error Correction Review A single overall parity-check equation detects single errors. Hamming codes used m equations to correct one error in 2 m 1 bits. We can use nonbinary equations if we create symbols
More informationSpeeding Up finite Field Inversion for Cryptographic Applications
University of Windsor Scholarship at UWindsor Electronic Theses and Dissertations 2012 Speeding Up finite Field Inversion for Cryptographic Applications Walid Mahmoud University of Windsor Follow this
More informationNotes on Primitive Roots Dan Klain
Notes on Primitive Roots Dan Klain last updated March 22, 2013 Comments and corrections are welcome These supplementary notes summarize the presentation on primitive roots given in class, which differed
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationAlgebra II Chapter 5: Polynomials and Polynomial Functions Part 1
Algebra II Chapter 5: Polynomials and Polynomial Functions Part 1 Chapter 5 Lesson 1 Use Properties of Exponents Vocabulary Learn these! Love these! Know these! 1 Example 1: Evaluate Numerical Expressions
More informationDual-Field Arithmetic Unit for GF(p) and GF(2 m ) *
Institute for Applied Information Processing and Communications Graz University of Technology Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * CHES 2002 Workshop on Cryptographic Hardware and Embedded
More informationPolynomial Functions and Their Graphs
Polynomial Functions and Their Graphs Definition of a Polynomial Function Let n be a nonnegative integer and let a n, a n- 1,, a 2, a 1, a 0, be real numbers with a n 0. The function defined by f (x) a
More informationLecture 7: More Arithmetic and Fun With Primes
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 7: More Arithmetic and Fun With Primes David Mix Barrington and Alexis Maciel July
More informationCPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary
CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables
More informationTropical Polynomials
1 Tropical Arithmetic Tropical Polynomials Los Angeles Math Circle, May 15, 2016 Bryant Mathews, Azusa Pacific University In tropical arithmetic, we define new addition and multiplication operations on
More information