Montgomery Multiplier and Squarer in GF(2 m )

Size: px
Start display at page:

Download "Montgomery Multiplier and Squarer in GF(2 m )"

Transcription

1 Montgomery Multiplier and Squarer in GF( m ) Huapeng Wu The Centre for Applied Cryptographic Research Department of Combinatorics and Optimization University of Waterloo, Waterloo, Canada h3wu@cacrmathuwaterlooca Abstract Montgomery multiplication in GF( m ) is defined by a(x)b(x) r 1 (x) modf(x), where the field is generated by irreducible polynomial f(x), a(x) andb(x) are two field elements in GF( m ), and r(x) isa fixed field element in GF( m ) In this paper, first we present a generalized Montgomery multiplication algorithm in GF( m ) Then by choosing r(x) according to f(x), we show that efficient architecture for bit-parallel Montgomery multiplier and squarer can be obtained for the fields generated with irreducible trinomials Complexities in terms of gate counts and time propagation delay of the circuits are investigated and found to be comparable to or better than that of polynomial basis or weakly dual basis multiplier for the same class of fields 1 Introduction Finite field has applications in combinatorial designs, sequences, error-control codes, and cryptography Finite field arithmetic operations have been paid much attention recently mainly because its use in cryptography, especially in elliptic curve cryptosystems Research in this area has been characterized by its strong flavor of implementation both in software and in hardware For example, fields of characteristic two are prevailingly used because a ground field operation can be readily implemented with a VLSI gate 1 In this paper, we first give a generalized Montgomery multiplication algorithm in GF( m ) Then by choosing the fixed field element r(x) accordingtothe irreducible polynomial, we show that efficient multiplication and squaring architectures can be obtained using the generalized algorithm of Montgomery multiplication in GF( m ) The implementation complexities in terms of the number of gates (equivalent to the number of ground field operations) and time propagation delay are lower than or as good as these of previously proposed multipliers for the same class of fields The main implementation results are summarized in the two theorems 1 A multiplication operation in GF() can be implemented using an AND gate, while an addition operation in GF() can be implemented with an XOR gate ÇK Koç and C Paar (Eds): CHES 000, LNCS 1965, pp 64 76, 000 c Springer-Verlag Berlin Heidelberg 000

2 Montgomery Multiplier and Squarer in GF( m ) 65 Preliminaries Montgomery multiplication was first proposed for integer modular multiplication that can avoid trial division [] Later it was extended to finite field multiplication in GF( m ) [1] It was shown that the operation can be made simple if certain type of r(x) is selected [1] In the following, we give a brief review of the Montgomery multiplication in GF( m )proposedin[1] Let f(x) be the irreducible polynomial that defines the field GF( m )and r(x) be a fixed element in GF( m ) Since gcd(f(x),r(x)) = 1, we can use the extended Euclidean algorithm to determine f (x) andr (x) thatsatisfy r(x)r (x)+f(x)f (x) =1 (1) Clearly r (x) =r 1 (x)istheinverseofr(x) Given two field elements a(x),b(x) GF( m ), then an analogue for Montgomery multiplication in GF( m )canbe given by [1] c(x) =a(x)b(x)r 1 (x) modf(x), () and an algorithm to compute () is shown below: Algorithm 1 Montgomery multiplication in GF( m ) [1] Input: a(x),b(x),r(x),f (x) Output: c(x) =a(x)b(x)r 1 (x) modf(x) Step 1 t(x) a(x)b(x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) The correctness of Algorithm 1 can be easily checked Note that deg[c(x)] max{deg[t(x)], deg[u(x)] + deg[f(x)]} deg[r(x)] =max{m, deg[r(x)] 1+m} deg[r(x)] =max{m deg[r(x)],m 1} Thus, to have deg[c(x)] m 1,thedegreeofr(x) mustbechosennotlessthan m 1 Since f(x) andf (x) can be considered as constants, it is noted in [1] that efficient multiplication can be achieved if r(x) is properly chosen In fact, r(x) was chosen to be the monomial x m in [1] and Algorithm 1 is equivalent to a polynomial multiplication, two constant multiplications in GF( m )andone addition in GF( m ) 3 Generalized Montgomery Multiplication in GF( m ) For bit-parallel realization of Montgomery multiplication in GF( m ), we find that efficient multiplier architecture can be obtained if r(x) is chosen according to the irreducible polynomial f(x) For example, if the field is generated with a trinomial f(x) =x m + x k +1,thenr(x) is selected to be the term of the second

3 66 Huapeng Wu low degree in the trinomial This choice of r(x) =x k turns out to be very helpful in obtaining low complexity multiplier and squarer architectures However, Algorithm 1 can not directly be used for these cases since k can be less than m 1 This leads us to consider a generalized form of Montgomery multiplication in GF( m ) In the following, we first present a generalized Montgomery algorithm in GF( m ), then compare it with Algorithm 1 Algorithm Generalized Montgomery multiplication in GF( m ) Input: a(x),b(x),r(x),f(x),f (x) Output: c(x) =a(x)b(x)r 1 (x) modf(x) Step 1 t(x) a(x)b(x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) Step 4 If deg( c) >m 1, then c(x) c(x) modf(x), else c(x) c(x) The correctness check for the algorithm is similar to that of Algorithm 1 The degree range of c(x) can be estimated Since 0 deg[a(x)] m 1and 0 deg[b(x)] m 1, it follows 0 deg[t(x)] m Assume deg[r(x)] = k, then from Step we have 0 deg[u(x)] k 1 From Step 3, we have deg[ c(x)] max{m k,m 1} (3) When deg[r(x)] = k<m 1, the degree of c(x) ism k and higher than m 1 In this case, one more step of modulo reduction (Step 4) is needed Compared to Algorithm 1, Algorithm extends the degree range that r(x) can be chosen from Algorithm 1 can be considered as a specific case of Algorithm For example, when r(x) is chosen such that deg r(x) m 1, then c(x) obtained at Step 3 in Algorithm has a degree equal to or less than m 1 In this case, Step 4 will not be performed and the algorithm is the same as Algorithm 1 In fact, Algorithm looks more similar to the original Montgomery algorithm [] than Algorithm 1 This is because Step 4 in Algorithm corresponds to the final subtraction step in the original Montgomery algorithm [] In Algorithm 1 this step has been omitted provided that some condition has been applied to how to choose r(x) 4 Montgomery Multiplier in GF( m ) Consider the irreducible polynomial f(x) =x m + x k +1, m k m 1, and the fixed field element r(x) = x k for the Montgomery multiplication in GF( m ) (Algorithm ) From the Extended Euclidean Algorithm, we obtain r 1 (x) =1+x m k and f (x) =1thatsatisfy r(x)r 1 (x)+f(x)f (x) =1 To solve the coefficients of the product c(x) in terms of these of a(x) and b(x) and thus to find efficient multiplier architectures, we proceed with each step of Algorithm as follows

4 Montgomery Multiplier and Squarer in GF( m ) Step 1 in Algorithm Let polynomial basis representations of a(x) and b(x) be given by a(x) = m 1 a ix i,a i GF(), and b(x) = m 1 b ix i,b i GF(), respectively Then t(x) =a(x)b(x) can be obtained as follows; t(x) =a(x)b(x) = m t i x i, (4) where t i s are given by t i = i a j b i j, 0 i m 1, j=0 m 1 j=i m+1 a j b i j,m i m (5) It can be seen that total m bit multiplications and (m 1) bit additions in GF() are required to compute t i, i =0, 1,,m An implementation of (5) is straightforward, and the gate counts and time delays incurred with signals t i, i =0, 1,,m, are listed in Table 1 We denote the time delays of an AND gate and an XOR gate by T A and T X, respectively Table 1 Complexity and Time Delay Involved in Implementing t(x) Signal # AND gates # XOR gates Time delay t 0 = a 0b T A t 1 = a 0b 1 + a 1b 0 1 T A + T X t = a 0b + a 1b 1 + a b 0 3 T A +T X t 3 = a 0b 3 + a 1b + a b 1 + a 3b T A +T X = t m = a 0b m + + a m b 0 m 1 m T A + log (m 1) T X t m 1 = a 0b m a m 1b 0 m m 1 T A + log m T X t m = a 1b m a m 1b 1 m 1 m T A + log (m 1) T X = t m 3= a m b m 1 + a m 1b m 1 T A + T X t m = a m 1b m T A Total: m (m 1) T A + log m T X In the following, we will solve the rest three steps of Algorithm and show that they can be realized at one single implementation step

5 68 Huapeng Wu 4 Step in Algorithm Substitute t(x) in this step using(4) u(x) =t(x)f (x) modr(x) = t 0 + t 1 x + t x + + t m x m mod x k = t 0 + t 1 x + t x + + t k 1 x k 1 (6) Clearly, the degree of u(x) is not higher than that of r(x) If r(x) is chosen to have a low degree then we have a simple u(x) 43 Step 3 in Algorithm Define and t L (x) = t 0 + t 1 x + t x + + t k 1 x k 1, (7) t H (x) = t k + t k+1 x + + t m x m k (8) From (4) (7) and (8), it can be seen that and from (6) and (7) it follows t(x) =t L (x)+x k t H (x), (9) u(x) =t L (x) (10) Substitute t(x) and u(x) in Step 3 with (9) and (10), respectively, and note that f(x) =x m + x k +1,wehave c(x) =[t(x)+u(x)f(x)]/r(x) =[t L (x)+x k t H (x)+t L (x)(x m + x k +1)]/x k =[x k t H (x)+x k (x m k +1)t L (x)]/x k = t H (x)+x m k t L (x)+t L (x) (11) When k = m 1, from (3) we have deg c(x) m 1 Clearly, in this case the degree of c(x) has already been reduced to the proper range and Step 4 in Algorithm is not necessary Extend each of the three terms at the right hand side of (11) for the case of k = m 1, and from (7) and (8) we have t H (x) =t m 1 + t m x + + t m x m 1, xt L (x) =t 0 x + t 1 x + + t m x m 1, t L (x) =t 0 + t 1 x + + t m x m (1)

6 Montgomery Multiplier and Squarer in GF( m ) 69 Then by comparing (1) with (11), and note c(x) =c(x) = write c i as follows c 0 = t 0 + t m 1, c 1 = t 0 + t 1 + t m, c = t 1 + t + t m+1, c m = t m 3 + t m + t m 3, c m 1 = t m + t m m 1 c i x i,wecan Rewrite the above expressions as t 0 + t m 1, i =0, c i = t i 1 + t i + t m 1+i,i=1,,,m, t m + t m, i = m 1 (13) It can be seen from (13) that each c i can be obtained with bit additions in GF(), except that c 0 and c m 1 require one bit operation each Thus, a bitparallel realization of (13) needs m XOR gates Since the maximal number of terms on the right hand side of each equation in (13) is three, the maximal time propagation delay is T X When m k<m 1, from (3) we have deg c(x) >m 1 In this case, a step of modulo reduction is still needed 44 Step 4 in Algorithm From (8) we divide t H (x) intotwoparts:t H (x) =t (1) H (x)+t() H (x), where and t (1) H (x) = t k + t k+1 x + + t k+m 1 x m 1, (14) t () H (x) = t k+m x m + t k+m+1 x m t m x m k (15) Substitute t H (x) in (11) with t (1) H f(x), we have (x) +t() H (x) and note that c(x) = c(x) mod c(x) = c(x) modf(x) =[t (1) H (x)+t() H (x)+xm k t L (x)+t L (x)] mod f(x) = t (1) H (x)+xm k t L (x)+t L (x)+[t () H (x)] mod f(x) (16)

7 70 Huapeng Wu Apply the modulo operation to each term on the right hand side of (15), it follows t k+m x m mod f(x) =t k+m (1 + x k ), t k+m+1 x m+1 mod f(x) =t k+m+1 (x + x k+1 ), t m x m k mod f(x) =t m (x m k + x m ) Adding the above m k 1 equations together, we obtain Split t () H (x) intotwoparts: m k t () H (x) modf(x) = m t m+k+i x i + t m+i x i i=k t (,1) H (x) modf(x) = m k t m+k+i x i, (17) Substitute t () H it follows m 1 t (,) H (x) modf(x) = m t m+i x i (18) (x) witht(,1) H (x)+t(,) H c i x i = t L (x)+x m k t L (x)+t (1) i=k m 1 (x) in (16) and note that c(x) = c i x i, H (x)+t(,1) H (x)+t(,) H (x) (19) Rewrite the equations (7), (14), (17), (18) and extend the term x m k t L (x) using (7), we have the following five equations for the five terms on the right hand side of (19), respectively: (a) t L (x) =t 0 + t 1 x + t x + + t k 1 x k 1 [0,k 1] (b) x m k t L (x) =t 0 x m k + t 1 x m k t k 1 x m 1 [m k, m 1] (c) t (1) H (x) =t k + t k+1 x + + t k+m 1 x m 1 [0,m 1] (d) t (,1) H (x) =t m+k + t m+k+1 x + + t m x m k [0,m k ] (e) t (,) H (x) =t m+kx k + t m+k+1 x k t m x m [k, m ] (0) The last column in the above array is the degree range of the terms on the right-hand side of each equation Now we are ready to solve the coefficients c i by comparing (19) with (0)

8 Montgomery Multiplier and Squarer in GF( m ) 71 In the following, we consider three cases: Case 1: If m +1 <k<m 1 We have m k <m k<k 1 <kby comparing (19) with (0), we can solve c i s (the coefficient of the term x i in c(x)) When 0 i m k, it can be seen from (0) that c i takes on the terms from equations (a), (c) and(d) When i = m k 1, c m k 1 has only two terms, one is from equation (a) and the other from (c) When i runs through from m k to k 1, c i picks up the terms from equations (a), (b) and(c) When k i m, c i has three terms: one from equation (b), one from (c) and the other from (e) Finally, c m 1 hastwotermsfrom equations (b) and(c), respectively We can write c i s as follows (a) (b) (c) (d) (e) c 0 = t 0 +t k +t k+m c 1 = t 1 +t k+1 +t k+m+1 c = t m k m k +t m +t m c m k 1 = t m k 1 +t m 1 c m k = t m k +t 0 +t m (1) c k 1 = t k 1 +t k m 1 +t k 1 c k = +t k m +t k +t k+m c m = +t k +t m+k +t m c m 1 = +t k 1 +t m+k 1 where all the terms at the column (a), (b), are from the equations (a), (b), in (0), respectively Now we can estimate the complexity to obtain the coefficients of the product from t i s From (1), it can be seen that m bit addition in GF() are used to solve c i s The longest time delay to generate c i from t i is T X Case If k = m +1 Wehavem k <m k = k 1 <k By comparing (19) to (0) the coefficients of c(x) can be written as follows (a) (b) (c) (d) (e) c 0 = t 0 +t k +t k+m c 1 = t 1 +t k+1 +t k+m+1 c m k = t k 3 +t k 3 +t m c m k 1 = t k +t k () c m k = t k 1 +t 0 +t k 1 c k = +t 1 +t k t k+m c m = +t k +t m+k +t m c m 1 = +t k 1 +t m+k 1

9 7 Huapeng Wu It can be seen that a realization of the above expressions requires m ground field operations Since the most terms to sum up for each c i is three, the maximal time delay is T X Case 3 If k = m Wehavem k =k <k 1 <m k = k The coefficients of the Montgomery product can be obtained from (19) and (0) as follows: (c) (a) (d) (b) (e) c 0 = t k +(t 0 +t k+m ) c 1 = t k+1 +(t 1 +t k+m+1 ) c k = t m +(t k +t m ) c k 1 = t m 1 +t k 1 c k = t m +(t 0 +t k+m ) c k+1 = t m+1 +(t 1 +t k+m+1 ) c m = t m+k +(t k +t m ) c m 1 = t m+k 1 +t k 1 (3) Note that the resued partial sums are put in the brackets Then it can be seen from (3) that m (k 1) = 3 m 1 bit additions in GF() are required to compute c 0,,c m 1 from t 0,,t m The time delay incurred here is still T X 45 Bit-Parallel Multiplier Architecture From the above discussion, it can be seen that a bit-parallel Montgomery multiplication in GF( m ) is decided by (5) and one of the expressions (1), () and (3) A diagram for the bit-parallel multiplier architecture is shown in Fig 1 The upper two modules (one all-and-gate circuits and one all-xor-gate circuits) are used to perform polynomial multiplication (Step 1 in Algorithm ), while the module at the bottom (all-xor-gate circuits) corresponds to the implementation of Steps to 4 in Algorithm It can be seen from Table 1 that m AND agtes and (m 1) XOR gates are required for generating t i Then the coefficients of c(x) can be generated from t i using one of (1), () and (3) Obviously, the total number of gates required are AND gates, m 1 XOR gates, m if the irreducible trinomial is f(x) =x m + x k +1, m <k m 1 When f(x) =x m + x m + 1, the complexity is only m m m AND gates, XOR gates

10 Montgomery Multiplier and Squarer in GF( m ) 73 a0 :::a m 1 b0 :::b m 1 Step 1 AND network XOR network t0 :::t m Steps -4 XOR network c0 :::c m 1 Fig 1 Bit-Parallel Montgomery Multiplier Architecture when f(x) =x m +x k + 1andr(x) =x k Total time delay of the multiplier is not greater than T A +( log m +)T X In many cases the total propagation delay is less than the above bound Note from the Table 1 that the time delay incurred with different t i is different In fact, circuits for generating t i has a time delay log (i +1) T X if i m 1, and log (m i 1) T X if i m From (13), (1), () and (3), it can be seen that most c i s is a sum of three terms Write them as c i = t i1 + t i + t i3,where we assume that the time delays for generating t i1,t i,andt i3 are d 1,d,andd 3, respectively If d 1 d d 3, then it can be seen that the propagation delay for generating c i depends on d and d 3 if the circuit is designed using c i =(t i1 t i ) t i3 The time delay incurred with the above logic equation for generating c i is T ci =max{d +,d 3 +1} Using this method, we search and find the maximal time delays incurred with the expressions (13), (1), () and (3) 46 Complexity Results and Example We summarize the implementation results on Montgomery multiplier in GF( m ) as follows: Theorem 1 Let the finite field GF( m ) be defined by irreducible trinomial f(x) =x m + x k +1, m k m 1 Then a bit-parallel Montgomery multiplier in GF( m ) can be constructed from the expression (5), and one of the expressions (13), (1), () and (3) The complexity and time propagation delay are given as follows

11 74 Huapeng Wu 1 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log (m ) +)T X,ifk = m 1 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log (m k ) +)T X,if m +1 k m 1 3 The complexity is m AND gates and m 1 XOR gates The incurred time delay is T A +( log k +)T X,ifk = m +1 4 The complexity is m AND gates and m m XOR gates The incurred time delay is T A +( log (m 1) + 1)T X,ifk = m 47 Montgomery Squarer in GF( m ) When Algorithm is used for squaring operation, only the first step needs to be changed We rewrite Algorithm for Montgomery squaring in GF( m ) as follows Algorithm 3 Generalized Montgomery squaring in GF( m ) Input: a(x),r(x),f(x),f (x) Output: c(x) =a (x)r 1 (x) modf(x) Step 1 t(x) a (x) Step u(x) t(x)f (x) modr(x) Step 3 c(x) [t(x) + u(x)f(x)]/r(x) Step 4 If deg( c) >m 1, then c(x) c(x) modf(x), else c(x) c(x) With the same selection of the field f(x) =x m +x k +1 and the fixed element r(x) =x k, we proceed with Algorithm 3 step by step Step 1 From t(x) =a (x), we have m 1 a i x i = It can be seen from the above expression m t i x i t i = { a i,,,,m ; 0, i =1, 3,,m 3 (4) Not like multiplication, there is no bit operations needed here to obtain t i Step -4 These three steps are very similar to these in Algorithm, and many intermediate results obtained in the last section can also be used here In the following we only consider the case that k = m 1andm is even For the other cases the deduction is similar From (1) and (4), we have (a) t L (x) =a 0 + a 1 x + a x a m x m [0,m ] (b) xt L (x) =a 0 x + a 1 x a m x m 1 [1,m 1] (c) t H (x) =a m x a m+ m 1 x m 1 [1,m 1] (5)

12 Montgomery Multiplier and Squarer in GF( m ) 75 Note that the expression (a) in (5) has only even power terms and (b) and (c) have only odd power terms Comparing (5) to (11) and note c(x) = c(x) when k = m 1, the coefficients c i can be obtained as follows c i = { a i, i =0,,,m ; + a m+i 1,i=1, 3,,m 1 a i 1 (6) It can be seen that m bit additions in GF() are required to compute c i using (6) Then we know that to implement a bit-parallel Montgomery squarer needs only m XOR gates The time delay for this Montgomery squarer is equivalent to the delay of one XOR gate T X The implementation results can be summarized as follows: Theorem Let the finite field GF( m ) be defined by irreducible trinomial f(x) =x m +x k +1, m k m 1 Then a bit-parallel Montgomery squarer in GF( m ) can be built with m 1 XOR gates and the time propagation delay is T X 5 Comparison Table Comparison of Bit-Parallel Multipliers Proposals # AND #XOR Time delay f(x) =x m + x +1 Wu, Hasan and Blake [6] m m 1 T A +( log m +1)T X Sunar and Koc [3] m m 1 T A +( log m +1)T X Wu [5] m m 1 T A +( log (m ) +)T X Presented here m m 1 T A +( log (m ) +)T X f(x) =x m + x k +1, 1 <k< m l l mm Wu, Hasan and Blake [6] m m 1 T A + log m + k 1 + T X Sunar and Koc [3] m m 1 T A +( log m +)T X Wu [5] m m 1 T A +( log (m 1) +)T X Presented here m m 1 T A +( log (m k ) +)TX f(x) =x m + x m +1 Wu, Hasan and Blake [6] m m m l m m T A + llog m + m4 T X Sunar and Koc [3] m m m Wu [5] m m m Presented here m m m T A +( log m +1)T X T A +( log (m 1) +1)T X T A +( log (m 1) +1)T X Table gives a comparison of four different implementations of bit-parallel multiplier in the same class of fields Note that we consider the fields generated

13 76 Huapeng Wu with two irreducible reciprocal trinomials are the same The bit-parallel multiplier proposed by Wu, Hasan and Blake uses weakly dual basis (WDB) [6] Sunar and Koc presented all trinomial Mastrovito multiplier using polynomial basis The polynomial basis multiplier proposed in [5] has a different architecture from the Mastrovito multiplier It can be seen that all the multipliers achieve the same complexity in terms of the numbers of AND and XOR gates The time propagation delay incurred with the multiplier presented here comparable to that of the previously proposed multipliers Table 3 Comparison of Polynomial Basis Bit-Parallel Squarers Proposals #XOR Time delay f(x) =x m + x k +1,wherem + k odd Wu [5] m + k 1 T X l m Presented here m 1 T X f(x) =x m + x k +1, where bothm and k are odd Wu [5] m 1 T X Presented here m 1 T X It can be seen from Table 3 that Montgomery squarer has both lower complexityand lowertimepropagationdelayfor thecase that m+k is odd, compared to the regular polynomial basis squarer presented in [5] References 1 C K Koc and T Acar Montgomery multiplication in GF( k ) Designs, Codes and Cryptography, 14:57 69, 1998 P L Montgomery Modular multiplication without trial division Mathematics of Computation, 44:519 51, B Sunar and C K Koc Mastrovito multiplier for all trinomials IEEE Trans Comput, 48(5):5 57, M Wang and I F Blake Bit serial multiplication in finite fields SIAM Discrete Mathematics, 3(1): , H Wu Low-complexity arithmetic in finite field using polynomial basis In CHES 99, pages Springer-Verlag, H Wu, M A Hasan, and I F Blake Low complexity weakly dual basis bit-parallel multiplier over finite fields IEEE Trans Comput, 47(11):13 134, November 1998 A PB bit-parallel multiplier can be readily made by adding a basis conversion module to both the input and the output ends By a theorem proposed in [4], when the field is generated with an irreducible trinomial, the coefficients of a field element in WDB is nothing but a permutation of the coefficients of the element in PB Thus a weakly dual basis bit-parallel multiplier proposed in [4] can be used as a polynomial basis bit-parallel multiplier without additional gates and time delay

BSIDES multiplication, squaring is also an important

BSIDES multiplication, squaring is also an important 1 Bit-Parallel GF ( n ) Squarer Using Shifted Polynomial Basis Xi Xiong and Haining Fan Abstract We present explicit formulae and complexities of bit-parallel shifted polynomial basis (SPB) squarers in

More information

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials Yin Li 1, Gong-liang Chen 2, and Xiao-ning Xie 1 Xinyang local taxation bureau, Henan, China. Email:yunfeiyangli@gmail.com, 2 School

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

PARALLEL MULTIPLICATION IN F 2

PARALLEL MULTIPLICATION IN F 2 PARALLEL MULTIPLICATION IN F 2 n USING CONDENSED MATRIX REPRESENTATION Christophe Negre Équipe DALI, LP2A, Université de Perpignan avenue P Alduy, 66 000 Perpignan, France christophenegre@univ-perpfr Keywords:

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials C. Shu, S. Kwon and K. Gaj Abstract: The efficient design of digit-serial multipliers

More information

Reducing the Complexity of Normal Basis Multiplication

Reducing the Complexity of Normal Basis Multiplication Reducing the Complexity of Normal Basis Multiplication Ömer Eǧecioǧlu and Çetin Kaya Koç Department of Computer Science University of California Santa Barbara {omer,koc}@cs.ucsb.edu Abstract In this paper

More information

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation M A Hasan and C Negre Abstract We study Dickson bases for binary field representation Such representation

More information

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team

More information

A new class of irreducible pentanomials for polynomial based multipliers in binary fields

A new class of irreducible pentanomials for polynomial based multipliers in binary fields Noname manuscript No. (will be inserted by the editor) A new class of irreducible pentanomials for polynomial based multipliers in binary fields Gustavo Banegas Ricardo Custódio Daniel Panario the date

More information

GF(2 m ) arithmetic: summary

GF(2 m ) arithmetic: summary GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation

More information

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials

Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials 1 Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials Yin Li, Xingpo Ma, Yu Zhang and Chuanda Qi Abstract We present a new type of bit-parallel non-recursive Karatsuba multiplier over

More information

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases 1 Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases H. Fan and M. A. Hasan March 31, 2007 Abstract Based on a recently proposed Toeplitz

More information

Montgomery Multiplication in GF(2 k ) * **

Montgomery Multiplication in GF(2 k ) * ** Designs, Codes and Cryptography, 14(1), 57 69 (April 1998) c April 1998 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Montgomery Multiplication in GF(2 k ) * ** ÇETIN K. KOÇ AND

More information

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises

More information

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER Indian Journal of Electronics and Electrical Engineering (IJEEE) Vol.2.No.1 2014pp1-6 available at: www.goniv.com Paper Received :05-03-2014 Paper Published:28-03-2014 Paper Reviewed by: 1. John Arhter

More information

Revisiting Finite Field Multiplication Using Dickson Bases

Revisiting Finite Field Multiplication Using Dickson Bases Revisiting Finite Field Multiplication Using Dickson Bases Bijan Ansari and M. Anwar Hasan Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada {bansari,

More information

Modular Multiplication in GF (p k ) using Lagrange Representation

Modular Multiplication in GF (p k ) using Lagrange Representation Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier

More information

New Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis

New Bit-Level Serial GF (2 m ) Multiplication Using Polynomial Basis 2015 IEEE 22nd Symposium on Computer Arithmetic New Bit-Level Serial GF 2 m ) Multiplication Using Polynomial Basis Hayssam El-Razouk and Arash Reyhani-Masoleh Department of Electrical and Computer Engineering

More information

Formulas for cube roots in F 3 m

Formulas for cube roots in F 3 m Discrete Applied Mathematics 155 (2007) 260 270 www.elsevier.com/locate/dam Formulas for cube roots in F 3 m Omran Ahmadi a, Darrel Hankerson b, Alfred Menezes a a Department of Combinatorics and Optimization,

More information

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2) An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Finite Fields. Mike Reiter

Finite Fields. Mike Reiter 1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements

More information

Proceedings, 13th Symposium on Computer Arithmetic, T. Lang, J.-M. Muller, and N. Takagi, editors, pages , Asilomar, California, July 6-9,

Proceedings, 13th Symposium on Computer Arithmetic, T. Lang, J.-M. Muller, and N. Takagi, editors, pages , Asilomar, California, July 6-9, Fast Software Exponentiation in GF(2 k ) C. K. Koc and T. Acar Electrical & Computer Engineering Oregon State University Corvallis, Oregon, 97331, USA E-mail: fkoc,acarg@ece.orst.edu Abstract We present

More information

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields

Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields Efficient Digit-Serial Normal Basis Multipliers over Binary Extension Fields ARASH REYHANI-MASOLEH and M. ANWAR HASAN University of Waterloo In this article, two digit-serial architectures for normal basis

More information

A Reduction Method for Multiplication in Finite Fields

A Reduction Method for Multiplication in Finite Fields A Reduction Method for Multiplication in Finite Fields Ç. K. Koç and A. Halbutoǧulları Electrical & Computer Engineering Oregon State University Corvallis, Oregon 97331 Technical Report, August 1998 Abstract

More information

On the Number of Trace-One Elements in Polynomial Bases for F 2

On the Number of Trace-One Elements in Polynomial Bases for F 2 On the Number of Trace-One Elements in Polynomial Bases for F 2 n Omran Ahmadi and Alfred Menezes Department of Combinatorics & Optimization University of Waterloo, Canada {oahmadid,ajmeneze}@uwaterloo.ca

More information

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences

A New Algorithm to Compute Terms in Special Types of Characteristic Sequences A New Algorithm to Compute Terms in Special Types of Characteristic Sequences Kenneth J. Giuliani 1 and Guang Gong 2 1 Dept. of Mathematical and Computational Sciences University of Toronto at Mississauga

More information

Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination

Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination Murat Cenk, Anwar Hasan, Christophe Negre To cite this version: Murat Cenk, Anwar Hasan, Christophe Negre.

More information

Polynomials. Chapter 4

Polynomials. Chapter 4 Chapter 4 Polynomials In this Chapter we shall see that everything we did with integers in the last Chapter we can also do with polynomials. Fix a field F (e.g. F = Q, R, C or Z/(p) for a prime p). Notation

More information

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields 1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE January 5, 2006 Abstract Based on Toeplitz matrix-vector

More information

FPGA Realization of Low Register Systolic All One-Polynomial Multipliers Over GF (2 m ) and their Applications in Trinomial Multipliers

FPGA Realization of Low Register Systolic All One-Polynomial Multipliers Over GF (2 m ) and their Applications in Trinomial Multipliers Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2016 FPGA Realization of Low Register Systolic All One-Polynomial Multipliers Over GF (2 m ) and their

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x),

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x f(x) = q(x)h(x) + r(x), Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 + + a n 1 x n 1 + a n x n, where the coefficients a 1, a 2,, a n are

More information

Arithmetic in Integer Rings and Prime Fields

Arithmetic in Integer Rings and Prime Fields Arithmetic in Integer Rings and Prime Fields A 3 B 3 A 2 B 2 A 1 B 1 A 0 B 0 FA C 3 FA C 2 FA C 1 FA C 0 C 4 S 3 S 2 S 1 S 0 http://koclab.org Çetin Kaya Koç Spring 2018 1 / 71 Contents Arithmetic in Integer

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields

A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields 1 A New Approach to Subquadratic Space Complexity Parallel Multipliers for Extended Binary Fields Haining Fan and M. Anwar Hasan Senior Member, IEEE July 19, 2006 Abstract Based on Toeplitz matrix-vector

More information

Implementation Options for Finite Field Arithmetic for Elliptic Curve Cryptosystems Christof Paar Electrical & Computer Engineering Dept. and Computer Science Dept. Worcester Polytechnic Institute Worcester,

More information

High Performance GHASH Function for Long Messages

High Performance GHASH Function for Long Messages High Performance GHASH Function for Long Messages Nicolas Méloni 1, Christophe Négre 2 and M. Anwar Hasan 1 1 Department of Electrical and Computer Engineering University of Waterloo, Canada 2 Team DALI/ELIAUS

More information

Novel Implementation of Finite Field Multipliers over GF(2m) for Emerging Cryptographic Applications

Novel Implementation of Finite Field Multipliers over GF(2m) for Emerging Cryptographic Applications Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2017 Novel Implementation of Finite Field Multipliers over GF(2m) for Emerging Cryptographic Applications

More information

Chapter 4 Finite Fields

Chapter 4 Finite Fields Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number

More information

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Are standards compliant Elliptic Curve Cryptosystems feasible on RFID? Sandeep S. Kumar and Christof Paar Horst Görtz Institute for IT Security, Ruhr-Universität Bochum, Germany Abstract. With elliptic

More information

Transition Faults Detection in Bit Parallel Multipliers over GF(2 m )

Transition Faults Detection in Bit Parallel Multipliers over GF(2 m ) Transition Faults Detection in Bit Parallel Multipliers over GF( m ) Hafizur Rahaman Bengal Engineering & Science University, Shibpur Howrah-73, India rahaman_h@it.becs.ac.in Jimson Mathew Computer Science

More information

ISSN (PRINT): , (ONLINE): , VOLUME-5, ISSUE-7,

ISSN (PRINT): , (ONLINE): , VOLUME-5, ISSUE-7, HIGH PERFORMANCE MONTGOMERY MULTIPLICATION USING DADDA TREE ADDITION Thandri Adi Varalakshmi Devi 1, P Subhashini 2 1 PG Scholar, Dept of ECE, Kakinada Institute of Technology, Korangi, AP, India. 2 Assistant

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) *

Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * Institute for Applied Information Processing and Communications Graz University of Technology Dual-Field Arithmetic Unit for GF(p) and GF(2 m ) * CHES 2002 Workshop on Cryptographic Hardware and Embedded

More information

arxiv: v1 [cs.sc] 16 Nov 2016

arxiv: v1 [cs.sc] 16 Nov 2016 1 Efficient Parallel Verification of Galois Field Multipliers Cunxi Yu, Maciej Ciesielski ECE Department, University of Massachusetts, Amherst, USA ycunxi@umass.edu, ciesiel@ecs.umass.edu arxiv:1611.05101v1

More information

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under

More information

Redundant Trinomials for Finite Fields of Characteristic 2

Redundant Trinomials for Finite Fields of Characteristic 2 122 Redundant Trinomials for Finite Fields of Characteristic 2 Christophe Doche Division of ICS, Department of Computing Macquarie University, NSW 2109 Australia doche@ics.mq.edu.au Abstract. In this article

More information

Hardware implementations of ECC

Hardware implementations of ECC Hardware implementations of ECC The University of Electro- Communications Introduction Public- key Cryptography (PKC) The most famous PKC is RSA and ECC Used for key agreement (Diffie- Hellman), digital

More information

SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM

SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM SUBQUADRATIC BINARY FIELD MULTIPLIER IN DOUBLE POLYNOMIAL SYSTEM Pascal Giorgi, Christophe Nègre 2 Équipe DALI, LP2A, Unversité de Perpignan avenue P. Alduy, F66860 Perpignan, France () pascal.giorgi@univ-perp.fr,

More information

A COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER. Jesus Garcia and Michael J. Schulte

A COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER. Jesus Garcia and Michael J. Schulte A COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER Jesus Garcia and Michael J. Schulte Lehigh University Department of Computer Science and Engineering Bethlehem, PA 15 ABSTRACT Galois field arithmetic

More information

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162 COMPUTER ARITHMETIC 13/05/2010 cryptography - math background pp. 1 / 162 RECALL OF COMPUTER ARITHMETIC computers implement some types of arithmetic for instance, addition, subtratction, multiplication

More information

One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing

One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing M. Serra, K. Cattell, S. Zhang, J.C. Muzio, D.M. Miller Dept. of Computer Science

More information

High-Speed Polynomial Basis Multipliers Over for Special Pentanomials. José L. Imaña IEEE

High-Speed Polynomial Basis Multipliers Over for Special Pentanomials. José L. Imaña IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL 63, NO 1, JANUARY 2016 1 High-Speed Polynomial Basis Multipliers Over for Special Pentanomials José L Imaña Abstract Efficient hardware implementations

More information

Galois Fields and Hardware Design

Galois Fields and Hardware Design Galois Fields and Hardware Design Construction of Galois Fields, Basic Properties, Uniqueness, Containment, Closure, Polynomial Functions over Galois Fields Priyank Kalla Associate Professor Electrical

More information

A Digit-Serial Systolic Multiplier for Finite Fields GF(2 m )

A Digit-Serial Systolic Multiplier for Finite Fields GF(2 m ) A Digit-Serial Systolic Multiplier for Finite Fields GF( m ) Chang Hoon Kim, Sang Duk Han, and Chun Pyo Hong Department of Computer and Information Engineering Taegu University 5 Naeri, Jinryang, Kyungsan,

More information

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute

More information

A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m )

A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m ) A Bit-Serial Unified Multiplier Architecture for Finite Fields GF(p) and GF(2 m ) Johann Großschädl Graz University of Technology Institute for Applied Information Processing and Communications Inffeldgasse

More information

A GENERAL POLYNOMIAL SIEVE

A GENERAL POLYNOMIAL SIEVE A GENERAL POLYNOMIAL SIEVE SHUHONG GAO AND JASON HOWELL Abstract. An important component of the index calculus methods for finding discrete logarithms is the acquisition of smooth polynomial relations.

More information

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group.

Algebra Review 2. 1 Fields. A field is an extension of the concept of a group. Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions

More information

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation

Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation 009 19th IEEE International Symposium on Computer Arithmetic Polynomial Multiplication over Finite Fields using Field Extensions and Interpolation Murat Cenk Department of Mathematics and Computer Science

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

EE 229B ERROR CONTROL CODING Spring 2005

EE 229B ERROR CONTROL CODING Spring 2005 EE 9B ERROR CONTROL CODING Spring 005 Solutions for Homework 1. (Weights of codewords in a cyclic code) Let g(x) be the generator polynomial of a binary cyclic code of length n. (a) Show that if g(x) has

More information

DESPITE considerable progress in verification of random

DESPITE considerable progress in verification of random IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1 Formal Analysis of Galois Field Arithmetic Circuits - Parallel Verification and Reverse Engineering Cunxi Yu Student Member,

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

On A Large-scale Multiplier for Public Key Cryptographic Hardware

On A Large-scale Multiplier for Public Key Cryptographic Hardware 1,a) 1 1 1 1 1 Wallace tree n log n 64 128 Wallace tree,, Wallace tree,, VHDL On A Large-scale Multiplier for Public Key Cryptographic Hardware Masaaki Shirase 1,a) Kimura Keigo 1 Murayama Hiroyuki 1 Kato

More information

Subquadratic Polynomial Multiplication over GF (2 m ) Using Trinomial Bases and Chinese Remaindering

Subquadratic Polynomial Multiplication over GF (2 m ) Using Trinomial Bases and Chinese Remaindering Subquadratic Polynomial Multiplication over GF (2 m ) Using Trinomial Bases and Chinese Remaindering Éric Schost 1 and Arash Hariri 2 1 ORCCA, Computer Science Department, The University of Western Ontario,

More information

Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs

Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Theoretical Modeling of the Itoh-Tsujii Inversion Algorithm for Enhanced Performance on k-lut based FPGAs Sujoy Sinha Roy, Chester Rebeiro and Debdeep Mukhopadhyay Department of Computer Science and Engineering

More information

Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form

Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form Toru Akishita Sony Corporation, 6-7-35 Kitashinagawa Shinagawa-ku, Tokyo, 141-0001, Japan akishita@pal.arch.sony.co.jp Abstract.

More information

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography

Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Acta Appl Math (2006) 93: 75 118 DOI 10.1007/s10440-006-9072-z Efficient Hardware Implementation of Finite Fields with Applications to Cryptography Jorge Guajardo Tim Güneysu Sandeep S. Kumar Christof

More information

Optimal Extension Field Inversion in the Frequency Domain

Optimal Extension Field Inversion in the Frequency Domain Optimal Extension Field Inversion in the Frequency Domain Selçuk Baktır, Berk Sunar WPI, Cryptography & Information Security Laboratory, Worcester, MA, USA Abstract. In this paper, we propose an adaptation

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2

REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 REDUNDANT TRINOMIALS FOR FINITE FIELDS OF CHARACTERISTIC 2 CHRISTOPHE DOCHE Abstract. In this paper we introduce so-called redundant trinomials to represent elements of nite elds of characteristic 2. The

More information

Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials

Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials Francisco Rodríguez-Henríquez 1, Guillermo Morales-Luna 1, Nazar A. Saqib 2 and Nareli Cruz-Cortés 1 (1) Computer

More information

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols

Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols Hardware Implementation of Elliptic Curve Point Multiplication over GF (2 m ) for ECC protocols Moncef Amara University of Paris 8 LAGA laboratory Saint-Denis / France Amar Siad University of Paris 8 LAGA

More information

Multiplication of Polynomials

Multiplication of Polynomials Summary 391 Chapter 5 SUMMARY Section 5.1 A polynomial in x is defined by a finite sum of terms of the form ax n, where a is a real number and n is a whole number. a is the coefficient of the term. n is

More information

IEEE TRANSACTIONS ON COMPUTERS, VOL. 45, NO. 7, JULY 1996 ,*-1 2 PRELIMINARIES. 2.1 General Multiplication in GF(2") I"?

IEEE TRANSACTIONS ON COMPUTERS, VOL. 45, NO. 7, JULY 1996 ,*-1 2 PRELIMINARIES. 2.1 General Multiplication in GF(2) I? 856 IEEE TRANSACTIONS ON COMPUTERS, VOL. 45, NO. 7, JULY 1996 Fi chitecture for a Parallel Finite lier with Low Complexity Based on Composite Fields Christof Paar Abstract-In this paper a new bit-parallel

More information

Efficient multiplication using type 2 optimal normal bases

Efficient multiplication using type 2 optimal normal bases Efficient multiplication using type 2 optimal normal bases Joachim von zur Gathen 1, Amin Shokrollahi 2, and Jamshid Shokrollahi 3 1 B-IT, Dahlmannstr. 2, Universität Bonn, 53113 Bonn, Germany gathen@bit.uni-bonn.de

More information

On the distribution of irreducible trinomials over F 3

On the distribution of irreducible trinomials over F 3 Finite Fields and Their Applications 13 (2007) 659 664 http://www.elsevier.com/locate/ffa On the distribution of irreducible trinomials over F 3 Omran Ahmadi Department of Combinatorics and Optimization,

More information

Parity of the Number of Irreducible Factors for Composite Polynomials

Parity of the Number of Irreducible Factors for Composite Polynomials Parity of the Number of Irreducible Factors for Composite Polynomials Ryul Kim Wolfram Koepf Abstract Various results on parity of the number of irreducible factors of given polynomials over finite fields

More information

High Performance GHASH Function for Long Messages

High Performance GHASH Function for Long Messages High Performance GHASH Function for Long Messages Nicolas Méloni, Christophe Negre, M. Anwar Hasan To cite this version: Nicolas Méloni, Christophe Negre, M. Anwar Hasan. High Performance GHASH Function

More information

PUBLIC-KEY cryptography (PKC), a concept introduced

PUBLIC-KEY cryptography (PKC), a concept introduced 1 Speeding Up Barrett and Montgomery Modular Multiplications Miroslav Knežević, Student Member, IEEE, Frederik Vercauteren, and Ingrid Verbauwhede, Senior Member, IEEE Abstract This paper proposes two

More information

How does the computer generate observations from various distributions specified after input analysis?

How does the computer generate observations from various distributions specified after input analysis? 1 How does the computer generate observations from various distributions specified after input analysis? There are two main components to the generation of observations from probability distributions.

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

Elliptic Curves I. The first three sections introduce and explain the properties of elliptic curves.

Elliptic Curves I. The first three sections introduce and explain the properties of elliptic curves. Elliptic Curves I 1.0 Introduction The first three sections introduce and explain the properties of elliptic curves. A background understanding of abstract algebra is required, much of which can be found

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

A VLSI Algorithm for Modular Multiplication/Division

A VLSI Algorithm for Modular Multiplication/Division A VLSI Algorithm for Modular Multiplication/Division Marcelo E. Kaihara and Naofumi Takagi Department of Information Engineering Nagoya University Nagoya, 464-8603, Japan mkaihara@takagi.nuie.nagoya-u.ac.jp

More information

Polynomials. Henry Liu, 25 November 2004

Polynomials. Henry Liu, 25 November 2004 Introduction Polynomials Henry Liu, 25 November 2004 henryliu@memphis.edu This brief set of notes contains some basic ideas and the most well-known theorems about polynomials. I have not gone into deep

More information

1. Group Theory Permutations.

1. Group Theory Permutations. 1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7

More information

Twitter: @Owen134866 www.mathsfreeresourcelibrary.com Prior Knowledge Check 1) Simplify: a) 3x 2 5x 5 b) 5x3 y 2 15x 7 2) Factorise: a) x 2 2x 24 b) 3x 2 17x + 20 15x 2 y 3 3) Use long division to calculate:

More information

Useful Arithmetic for Cryptography

Useful Arithmetic for Cryptography Arithmetic and Cryptography 1/116 Useful Arithmetic for Cryptography Jean Claude Bajard LIP6 - UPMC (Paris 6)/ CNRS France 8 Jul 2013 Arithmetic and Cryptography 2/116 Introduction Modern Public Key Cryptography

More information

KEY CONCEPTS. Factoring is the opposite of expanding.

KEY CONCEPTS. Factoring is the opposite of expanding. KEY CONCEPTS Factoring is the opposite of expanding. To factor simple trinomials in the form x 2 + bx + c, find two numbers such that When you multiply them, their product (P) is equal to c When you add

More information

Section 8.3 Partial Fraction Decomposition

Section 8.3 Partial Fraction Decomposition Section 8.6 Lecture Notes Page 1 of 10 Section 8.3 Partial Fraction Decomposition Partial fraction decomposition involves decomposing a rational function, or reversing the process of combining two or more

More information

Chapter 5. Cyclic Codes

Chapter 5. Cyclic Codes Wireless Information Transmission System Lab. Chapter 5 Cyclic Codes Institute of Communications Engineering National Sun Yat-sen University Outlines Description of Cyclic Codes Generator and Parity-Check

More information

ECEN 604: Channel Coding for Communications

ECEN 604: Channel Coding for Communications ECEN 604: Channel Coding for Communications Lecture: Introduction to Cyclic Codes Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 604: Channel Coding for Communications

More information

Division of Trinomials by Pentanomials and Orthogonal Arrays

Division of Trinomials by Pentanomials and Orthogonal Arrays Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang

More information

EECS150 - Digital Design Lecture 21 - Design Blocks

EECS150 - Digital Design Lecture 21 - Design Blocks EECS150 - Digital Design Lecture 21 - Design Blocks April 3, 2012 John Wawrzynek Spring 2012 EECS150 - Lec21-db3 Page 1 Fixed Shifters / Rotators fixed shifters hardwire the shift amount into the circuit.

More information

Rings. EE 387, Notes 7, Handout #10

Rings. EE 387, Notes 7, Handout #10 Rings EE 387, Notes 7, Handout #10 Definition: A ring is a set R with binary operations, + and, that satisfy the following axioms: 1. (R, +) is a commutative group (five axioms) 2. Associative law for

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information