Abstract
Finite field multiplication is a crucial building block for cryptography, especially the elliptic curve public key cryptosystem. Recently, various algorithms for efficient finite field multiplication over devices whose resources are extremely constrained have been proposed. However, most of these proposals only take speed optimization into account, but they do not pay much attention to optimization of memory usage. In this paper, we propose a multiplication algorithm on \(F_{2^{m}}\), which minimizes the RAM requirement by rescheduling operation sequences. According to our experimental results on the ATmega128L microprocessor, the proposed algorithm reduces the amount of required RAM by up to 50 % while maintaining the speed at the same level. We also verify the feasibility of our algorithm by applying it to the elliptic curve cryptosystem.
Similar content being viewed by others
Notes
Note that a polynomial addition and a polynomial subtraction are the same operations over \({\mathbb{F}}_{2^{m}}\), because a+bmod2=a−bmod2 for a,b∈{0,1}.
References
Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: CHES 2004. LNCS, vol 3156. Springer, Berlin, pp 925–943
Han TY, Lee MK (2009) Efficient algorithm for finite field operations on memory-constrained devices. J Comput Inf Sci Eng 15(4):270–274
Hankerson D, Menezes AJ, Vanstone S (2003) Guide to elliptic curve cryptography. Springer, Berlin
Karatsuba A, Ofman Y (1963) Multiplication of multidigit numbers on automata. Sov Phys Dokl 7(7):595–596
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209
Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008. IEEE Comput Soc, Los Alamitos, pp 245–256
López J, Dahab R (2000) High-speed software multiplication in \(F_{2^{m}}\). In: INDOCRYPT 2000. LNCS, vol 1977. Springer, Berlin, pp 203–212
Miller V (1986) Use of elliptic curves in cryptography. In: Crypto 85. LNCS, vol 218. Springer, Berlin, pp 417–426
Oliveira LB, Scott M, López J, Dahab R (2008) TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: INSS 2008, pp 173–180
Scott M (2003) MIRACL—a Multiprecision Integer and Rational Arithmetic C/C++ Library. Shamus Software Ltd., Dublin, Ireland. http://www.shamus.ie
Seo SC, Han DG, Kim HC, Hong S (2008) TinyECCK: efficient elliptic curve cryptography implementation over GF(2m) on 8-bit micaz mote. IEICE Trans Inf Syst 91-D(5):1338–1347
Acknowledgements
This research was supported by Next Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science, and Technology (No. 2011-0029925) and Inha University.
Author information
Authors and Affiliations
Corresponding author
Appendix: Proposed algorithm
Appendix: Proposed algorithm
Rights and permissions
About this article
Cite this article
Han, T.Y., Lee, MK. Reordering computation sequences for memory-efficient binary field multiplication. J Supercomput 66, 936–949 (2013). https://doi.org/10.1007/s11227-013-0930-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-013-0930-y