04.11.2012 Views

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

1 Montgomery Modular Multiplication in Hard- ware

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FEI KEMT<br />

the ECC <strong>in</strong>stead of the RSA or DSA [56] lies <strong>in</strong> the fact that the length of key<br />

can be much shorter. The best known algorithm for solv<strong>in</strong>g the elliptic curve dis-<br />

crete logarithm problem (ECDLP) takes fully exponential time, while the algorithms<br />

for the <strong>in</strong>teger factorization problem and the discrete logarithm problem take sub-<br />

exponential time. The comparison of key length for equivalent security level is<br />

presented <strong>in</strong> Table 1 – 1 [91].<br />

Table 1 – 1 Comparison of the key length (<strong>in</strong> bits) for equivalent security level for public-key<br />

cryptosystems<br />

Security (bits) DSA RSA ECC<br />

80 1024 1024 160-223<br />

112 2048 2048 224-255<br />

128 3072 3072 256-383<br />

192 7680 7680 384-511<br />

256 15360 15360 512+<br />

The fundamental and most expensive operation underly<strong>in</strong>g ECC is a po<strong>in</strong>t multi-<br />

plication, which is def<strong>in</strong>ed over field operations. For a po<strong>in</strong>t P and a positive <strong>in</strong>teger<br />

k, the po<strong>in</strong>t multiplication kP is def<strong>in</strong>ed by add<strong>in</strong>g k-times the po<strong>in</strong>t P to itself:<br />

kP = P + . . . + P<br />

� �� �<br />

k<br />

. (1.16)<br />

Various algorithms have been proposed for more efficient computation of the po<strong>in</strong>t<br />

multiplication tak<strong>in</strong>g <strong>in</strong>to account a fixed or unknown po<strong>in</strong>t P .<br />

The EC over F denoted as E is a curve that is given by an equation of the<br />

follow<strong>in</strong>g form:<br />

where E must be smooth.<br />

E : y 2 + a1xy + a3y = x 3 + a2x 2 + a4x + a6 , (ai ∈ F) (1.17)<br />

We let E(F) denote the set of po<strong>in</strong>ts (x, y) ∈ F 2 that satisfy this equation, along<br />

with a po<strong>in</strong>t at <strong>in</strong>f<strong>in</strong>ity denoted O. If the characteristic of F is neither 2 nor 3, then<br />

the Equation 1.17 can be simplified to the usually used form (so-called Weierstraß<br />

form):<br />

y 2 = x 3 + ax + b . (a, b ∈ F) (1.18)<br />

The condition for smoothness of the curve is, <strong>in</strong> this case, equals to the requirement<br />

of no multiple roots of the cubic element <strong>in</strong> the Equation 1.18. This holds if and<br />

only if the discrim<strong>in</strong>ant of x 3 + ax + b, which is −(4a 2 ) + 27b 3 , is nonzero.<br />

16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!