Abstract
This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our implementation in C on a Pentium II 400MHz workstation.
Keywords
- Elliptic Curve
- Elliptic Curf
- Elliptic Curve Cryptography
- Elliptic Curve Digital Signature Algorithm
- Binary Field
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Supported by a grant from Auburn University COSAM.
References
ANSI X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999.
ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Key Transport Protocols, working draft, August 1999.
E. Brickell, D. Gordon, K. McCurley and D. Wilson, “Fast exponentiation with precomputation”, Advances in Cryptology-Eurocrypt’ 92, LNCS 658, 1993, 200–207.
M. Brown, D. Cheung, D. Hankerson, J. Hernandez, M. Kirkup and A. Menezes, “PGP in constrained wireless devices”, Proceedings of the Ninth USENIX Security Symposium, 2000.
D. Chudnovsky and G. Chudnovsky, “Sequences of numbers generated by addition in formal groups and new primality and factoring tests”, Advances in Applied Mathematics, 7 (1987), 385–434.
E. De Win, A. Bosselaers, S. Vandenberghe, P. De Gersem and J. Vandewalle, “A fast software implementation for arithmetic operations in GF(2n)”, Advances in Cryptology-Asiacrypt’ 96, LNCS 1163, 1996, 65–76.
E. De Win, S. Mister, B. Preneel and M. Wiener, “On the performance of signature schemes based on elliptic curves”, Algorithmic Number Theory, Proceedings Third Intern. Symp., ANTS-III, LNCS 1423, 1998, 252–266.
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, 31 (1985), 469–472.
S. Galbraith and N. Smart, “A cryptographic application of Weil descent”, Codes and Cryptography, LNCS 1746, 1999, 191–200.
P. Gaudry, F. Hess and N. Smart, “Constructive and destructive facets of Weil descent on elliptic curves”, preprint, January 2000.
D. Gordon, “A survey of fast exponentiation methods”, Journal of Algorithms, 27 (1998), 129–146.
J. Guajardo and C. Paar, “Efficient algorithms for elliptic curve cryptosystems”, Advances in Cryptology-Crypto’97, LNCS 1294, 1997, 342–356.
IEEE P1363, Standard Specifications for Public-Key Cryptography, 2000.
ISO/IEC 14888-3, Information Technology-Security Techniques-Digital Signatures with Appendix-Part 3: Certificate Based-Mechanisms, 1998.
ISO/IEC 15946, Information Technology-Security Techniques-Cryptographic Techniques Based on Elliptic Curves, Committee Draft (CD), 1999.
D. Johnson and A. Menezes, “The elliptic curve digital signature algorithm (ECDSA)”, Technical report CORR 99-34, Dept. of C&O, University of Waterloo, 1999.
E. Knudsen, “Elliptic scalar multiplication using point halving”, Advances in Cryptology-Asiacrypt’ 99, LNCS 1716, 1999, 135–149.
D. Knuth, The Art of Computer Programming-Seminumerical Algorithms, Addison-Wesley, 3rd edition, 1998.
N. Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation, 48 (1987), 203–209.
N. Koblitz, “CM-curves with good cryptographic properties”, Advances in Cryptology-Crypto’91, LNCS 576, 1992, 279–287.
N. Koblitz, A. Menezes and S. Vanstone, “The state of elliptic curve cryptography”, Designs, Codes and Cryptography, 19 (2000), 173–193.
Ç. K. Koç and T. Acar, “Montgomery multiplication in GF(2k)”, Designs, Codes and Cryptography, 14 (1998), 57–69.
K. Koyama and Y. Tsuruoka, “Speeding up elliptic cryptosystems by using a signed binary window method”, Advances in Cryptology-Crypto’92, LNCS 740, 1993, 345–357.
C. Lim and P. Lee, “More flexible exponentiation with precomputation”, Advances in Cryptology-Crypto’94, LNCS 839, 1994, 95–107.
J. López and R. Dahab, “Improved algorithms for elliptic curve arithmetic in GF(2n)”, Selected Areas in Cryptography SAC’ 98, LNCS1556, 1999, 201–
J. López and R. Dahab, “Fast multiplication on elliptic curves over GF(2n) without precomputation”, Cryptographic Hardware and Embedded Systems-CHES’ 99, LNCS 1717, 1999, 316–327.
J. López and R. Dahab, “High-speed software multiplication in F2m”, preprint, 2000.
A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology-Crypto’85, LNCS 218, 1986, 417–426.
A. Miyaji, T. Ono and H. Cohen, “Efficient elliptic curve exponentiation”, Proceedings of ICICS’ 97, LNCS 1334, 1997, 282–290.
P. Montgomery, “Speeding up the Pollard and elliptic curve methods of factorization”, Mathematics of Computation, 48 (1987), 243–264.
F. Morain and J. Olivos, “Speeding up the computations on an elliptic curve using addition-subtraction chains”, Informatique théorique et Applications, 24 (1990), 531–544.
National Institute of Standards and Technology, Digital Signature Standard, FIPS Publication 186-2, February 2000.
National Institute of Standards and Technology, Advanced Encryption Standard, work in progress.
OpenSSL, http://www.openssl.org
R. Schroeppel, “Elliptic curve point halving wins big”, preprint, 2000.
R. Schroeppel, H. Orman, S. O’Malley and O. Spatscheck, “Fast key exchange with elliptic curve systems”, Advances in Cryptology-Crypto’95, LNCS 963, 1995, 43–56.
J. Solinas, “Efficient arithmetic on Koblitz curves”, Designs, Codes and Cryptography, 19 (2000), 195–249.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hankerson, D., López Hernandez, J., Menezes, A. (2000). Software Implementation of Elliptic Curve Cryptography over Binary Fields. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_1
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive