Efficient Scalar Multiplication over Elliptic Curve
Автор: Deepika Kamboj, D.K.Gupta, Amit Kumar
Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis
Статья в выпуске: 4 vol.8, 2016 года.
Бесплатный доступ
Elliptic Curve Scalar multiplication is the method of adding a point on the curve to itself every time[1]. In recent years, research in Scalar Multiplication over Elliptic curves (EC) over a finite fields attracted many researchers, working in field of cryptography, to find out how elliptic curves cryptography (ECC) can be implemented and how to reduce its complexity [4]. The efficient techniques used in Elliptic curve cryptography are Elliptic curve scalar multiplication using point-halving algorithm [2], then double-base (DB) chain algorithm, and after that step multi-base representation (SMBR), but these techniques have their drawbacks. So, it become imperative to find out a new approach which can be efficiently used for implementation of ECC and further reducing its complexity. The paper proposes a new algorithm Treble algorithm for affine coordinates. We continued doing work using the binary concept or double and add operation with the help of treble approach to make it more efficient which relates to the use of all input values in producing any type of output, including how much time and energy are required The results show that our contribution can significantly enhance EC scalar multiplication.
Elliptic curve cryptography, double and add operation, affine coordinates
Короткий адрес: https://sciup.org/15011519
IDR: 15011519
Текст научной статьи Efficient Scalar Multiplication over Elliptic Curve
Published Online April 2016 in MECS
Index Term —Elliptic curve cryptography, double and add operation, affine coordinates.
-
I. Introduction
Elliptic Curve Cryptography (ECC) was proposed as an alternative mechanism for implementing public- key cryptography in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington) [1]. Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic protocols ba sed on algorithms that needs two separate keys, out of these two, one is secret (or private) and another of public. Elliptic Curve Cryptography is based on discrete logarithms that are more computationally expensive to invert at equivalent
key lengths [8]. For general elliptic curves, we will present an improved version of scalar multiplication. We’ll present a treble concept as well with its basic operations doubling and addition. Treble method provides fast computation as compare to doubling and addition. Its computation is effective than first applying doubling and after that addition. Besides that we implemented a recursive approach as well where time complexity is reduced but number of functions calling in both approaches remain same but less than the existing approach. The primary advantage promised by ECC is a smaller key size, reducing storage and transmission requirements, i.e. an elliptic curve group could provide the same level of security afforded by an RSA-based system with a large modulus and correspondingly larger key – eg, a 384- bit ECC public key should provide comparable security to a 3072-bit RSA public key.
As the size of key increases, the difference in equivalent key size also increases. Modular arithmetic used in DH provides less security as compare to algebraic curves used in Elliptic curve cryptography. The approximate equivalence in security strength for RSA, DH and Elliptic curve cryptography is given in tables 1 and 2 shows that EC is better to use if key size is large.
Table 1. Key Strength of Elliptic Curve
Key length in bits |
DH security and EC security ratio |
80 |
3:1 |
112 |
6:1 |
128 |
10:1 |
192 |
32:1 |
256 |
64:1 |
Table 2. NIST Recommended Key Sizes
Symmetric Key length in bits |
Key length of RSA and DH in bits |
Key length of EC in bits |
80 |
1024 |
160 |
112 |
2048 |
224 |
128 |
3072 |
256 |
192 |
7680 |
384 |
256 |
15360 |
521 |
-
II. Mathematics of Elliptic Curve Cryptography
We can define Elliptic curves over both prime field and binary field. If P is a prime number or prime power, then FP will denote the field that has exactly P points on the curve [6]. When the greatest common divisor of P and b is 1, the elliptic curve over the field FPis expressed by the following equation:
-
E: Y2 = X3 + aX+ b(1)
Whereas, b are the coefficients in FP and 4a3+ 27b2≠ 0. While the general curve equation is defined as:
-
E: Y + XY = X + aX+ b(2)
Coordinates (X, Y) are used to define the affine coordinates which satisfy the curve equation. Coordinates for adding two different points
X3 = A2– X1 – X2 mod P(3)
Y3 = A(X1 – X3) – Y1 mod P(4)
Where
A=(Y2-Y1)/(X2-X1) mod P(5)
Coordinates for doubling a point:
X4 = A2– 2X1 mod P(6)
Y4 = A(X1 – X4) – Y1 mod P(7)
Where A= (3X12+a)/2Y1(8)
Table 3. Literature Work with Specified Problem
Список литературы Efficient Scalar Multiplication over Elliptic Curve
- Nagaraja Shylashree and Venugopalachar Sridhar, Hardware Realization of Fast Multi-Scalar Elliptic Curve Point Multiplication by Reducing the Hamming Weights OverGF(p),IJCNIS,2014.
- E. Knudsen, Elliptic scalar multiplication using point halving. Advances in Cryptology— ASIACRYPT 99, Lecture Notes in Computer Science, 1999.
- P. K. Mishra, V. S. Dimitrov. Efficient Quintuple Formulas for Elliptic Curves and efficient Scalar Multiplication Using Multibase Number Representation. Springer-Verlag, 2007.
- MohamedLehsaini, ChifaaTabetHellel, "Improvement of Scalar Multiplication Time for Elliptic Curve Cryptosystems", 2013 IEEE.
- J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey. Security in distributed, grid, mobile, and pervasive computing, 2007.
- N. Koblitz. Elliptic curve cryptosystems.Mathematics of computation, 1987.
- Ram RatanAhirwal and ManojAhke, "Elliptic Curve Diffie-Hellman Key ExchangeAlgorithm for Securing Hypertext Information on Wide Area Network", International Journal of Computer Science and Information Technologies, 2013.
- D.Hakerson, A. Menezes, and S. Vanston"Guide to Elliptic Curve Cryptography," Springer-Verlag, (2004).
- Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, "Secure key transport in symmetriccryptographic protocols using elliptic Curves over finite fields," International Journal Of Computer Applications, November 2011.
- D. Sravana Kumar Ch. Suneetha A. Chandrasekhar, "encryption of data using elliptic curve over finite fields", international journal of distributed and parallel systems, January 2012.
- Ch. Suneetha, D. Sravana Kumar and A. Chandrasekhar, "Secure key transport in symmetric cryptographic protocols using elliptic curves over finite fields", International Journal of Computer Applications, November 2011.
- William Stallings, "A text book of Cryptography and Network security", Principles and practices, Pearson education, fourth edition, 2007.
- Wasim A Al-Hamdani, Ph.D., "Elliptic Curve for Data protection", Kentucky State University 400 East Main, KY 40601 USA.
- Cohen, H., Miyaji, A., & Ono, T. (1998). Efficient elliptic curve exponentiation using mixed coordinates. In Advances in Cryptology— ASIACRYPT'98 (pp. 51-65). Springer Berlin/Heidelberg.
- Yoshitaka Nagai, Masaaki Shirase and Tetsuya Izu, "Elliptic Curve Scalar Multiplication with a Bijective Transform", 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.