Skip to main content
Log in

Reordering computation sequences for memory-efficient binary field multiplication

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Finite field multiplication is a crucial building block for cryptography, especially the elliptic curve public key cryptosystem. Recently, various algorithms for efficient finite field multiplication over devices whose resources are extremely constrained have been proposed. However, most of these proposals only take speed optimization into account, but they do not pay much attention to optimization of memory usage. In this paper, we propose a multiplication algorithm on \(F_{2^{m}}\), which minimizes the RAM requirement by rescheduling operation sequences. According to our experimental results on the ATmega128L microprocessor, the proposed algorithm reduces the amount of required RAM by up to 50 % while maintaining the speed at the same level. We also verify the feasibility of our algorithm by applying it to the elliptic curve cryptosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Fig. 2

Similar content being viewed by others

Notes

  1. Note that a polynomial addition and a polynomial subtraction are the same operations over \({\mathbb{F}}_{2^{m}}\), because a+bmod2=abmod2 for a,b∈{0,1}.

References

  1. Gura N, Patel A, Wander A, Eberle H, Shantz SC (2004) Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: CHES 2004. LNCS, vol 3156. Springer, Berlin, pp 925–943

    Google Scholar 

  2. Han TY, Lee MK (2009) Efficient algorithm for finite field operations on memory-constrained devices. J Comput Inf Sci Eng 15(4):270–274

    Google Scholar 

  3. Hankerson D, Menezes AJ, Vanstone S (2003) Guide to elliptic curve cryptography. Springer, Berlin

    Google Scholar 

  4. Karatsuba A, Ofman Y (1963) Multiplication of multidigit numbers on automata. Sov Phys Dokl 7(7):595–596

    Google Scholar 

  5. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48(177):203–209

    Article  MathSciNet  MATH  Google Scholar 

  6. Liu A, Ning P (2008) TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: IPSN 2008. IEEE Comput Soc, Los Alamitos, pp 245–256

    Google Scholar 

  7. López J, Dahab R (2000) High-speed software multiplication in \(F_{2^{m}}\). In: INDOCRYPT 2000. LNCS, vol 1977. Springer, Berlin, pp 203–212

    Chapter  Google Scholar 

  8. Miller V (1986) Use of elliptic curves in cryptography. In: Crypto 85. LNCS, vol 218. Springer, Berlin, pp 417–426

    Google Scholar 

  9. Oliveira LB, Scott M, López J, Dahab R (2008) TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. In: INSS 2008, pp 173–180

    Google Scholar 

  10. Scott M (2003) MIRACL—a Multiprecision Integer and Rational Arithmetic C/C++ Library. Shamus Software Ltd., Dublin, Ireland. http://www.shamus.ie

  11. Seo SC, Han DG, Kim HC, Hong S (2008) TinyECCK: efficient elliptic curve cryptography implementation over GF(2m) on 8-bit micaz mote. IEICE Trans Inf Syst 91-D(5):1338–1347

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by Next Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science, and Technology (No. 2011-0029925) and Inha University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mun-Kyu Lee.

Appendix: Proposed algorithm

Appendix: Proposed algorithm

Algorithm 2
figure 4

Proposed method with four temporary memory slots

Algorithm 3
figure 5

Proposed method with three temporary memory slots

Rights and permissions

Reprints and permissions

About this article

Cite this article

Han, T.Y., Lee, MK. Reordering computation sequences for memory-efficient binary field multiplication. J Supercomput 66, 936–949 (2013). https://doi.org/10.1007/s11227-013-0930-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-013-0930-y

Keywords

Navigation