Abstract
This chapter consists of three sections on arithmetic operations in the field GF(2m) with normal-basis representations and the implementation of those operations. The first section—a short one—is on addition and squaring; both are very simple operations with a normal basis. The second section is on multiplication, a more complicated operation than the preceding two. And the last section is on exponentiation, inversion, and division.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Note that this is another reason why the representation of the multiplicative identity element must be (11⋯1), given that (00⋯0) is already taken for the additive identity element.
- 2.
If m ≤ 2000, then it is not hard to find a suitable polynomial [2].
- 3.
The Hamming weight.
References
J. K. Omura and J. L. Massey. 1986. Computational method and apparatus for finite field arithmetic. U. S. Patent 4,587,627. United States Patent Office, Alexandria, Virginia, USA.
Institute of Electrical and Electronics Engineers. 2000. P1363: Standard Specifications For Public-Key Cryptography (Annex A). New York, New York, USA.
R. C. Mullin, S. A. Vanstone, I. M. Onyszchuk, and R.M. Wilson. 1988–1989. Optimal normal bases in GF(p n). Discrete Applied Mathematics, 22:149–161.
D. W. Ash, I. F. Blake, and S. A. Vanstone. 1989. Low complexity normal bases. Discrete Applied Mathematics, 25:191–210.
National Institute of Standards and Technology. 1999. Recommended Elliptic Curves for Federal Government Use. Gaithersburg, Maryland, USA.
T. Itoh and S. Tsujii. 1988. A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis. Information and Computation, 78:171–177.
F. Rodríguez-Henriquez, G. Morales-Luna, N. A. Saqib, and N. Cruz-Cortes. 2007. Parallel Itoh–Tsujii multiplicative inversion algorithm for a special class of trinomials. Designs, Codes and Cryptography, 45(1):19–37.
D. E. Knuth. 1998. The Art of Computer Programming, Vol. 2. Addison-Wesley, Reading, Massachusetts, USA.
J. Hu, W. Guo, J. Wei, and R. C. C. Cheung. 2015. Fast and generic inversion architectures over GF(2m) using modified Itoh-Tsujii algorithms. IEEE Transactions on Circuits and Systems–II: Express Briefs, 62(4):367–371.
N. Takagi, J.-I. Yoshiki, and K. Takagi. 2001. A fast algorithm for multiplicative inversion in GF(2m) using normal basis. IEEE Transactions on Computers, 50(6):394–398.
C. C. Wang, T. K. Truong, H. M. Shao, I. J. Deutsch, J. K. Omura, and I. S. Reed. 1985. VLSI architecture for computing multiplications and inverses in GF(2m). IEEE Transactions on Computers, 34(8):709–716.
P. Downey, B. Leong, and R. Sethi. 1982. Computing sequences with addition chains. SIAM Journal of Computing, 10:638–646.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
R. Omondi, A. (2020). Normal-Basis Arithmetic. In: Cryptography Arithmetic. Advances in Information Security, vol 77. Springer, Cham. https://doi.org/10.1007/978-3-030-34142-8_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-34142-8_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34141-1
Online ISBN: 978-3-030-34142-8
eBook Packages: Computer ScienceComputer Science (R0)