Skip to main content

Finite Fields of Characteristic 2

  • Chapter
  • First Online:
Fundamentals of Cryptography

Part of the book series: Undergraduate Topics in Computer Science ((UTICS))

  • 3188 Accesses

Abstract

In this chapter we extend beyond integers modulo primes to consider finite fields of characteristic 2. For a more extensive presentation of finite fields, the reader should consult Lidl and Niederreiter [1]. For a different presentation of finite fields of characteristic 2, the reader could consult Golomb [2]. Finite field arithmetic in characteristic 2 is used in the Advanced Encryption Standard (AES). It can be preferable in other cryptosystems, because computer hardware works in binary, and thus the underlying arithmetic operations needed to encrypt and decrypt can be very fast.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The first several Mersenne primes are for \(r = 2, 3, 5, 7, 13, 17, 19, 31, 61, 89, 107\) and 127; certainly from the last four of these we would get extremely long sequences of deterministically-produced bits that do happen to satisfy standard tests for being a random sequence of bits.

References

  1. R. Lidl, H. Niederreiter, Introduction to Finite Fields and Their Applications, 2nd edn. (Cambridge University Press, Cambridge, 1997)

    MATH  Google Scholar 

  2. S. Golomb, Shift Register Sequences (Aegean Park Press, 1982)

    Google Scholar 

  3. N. Zierler, J. Brillhart, On primitive trinomials (mod 2). Inform. Control 13, 541–554 (1968)

    Article  MathSciNet  Google Scholar 

  4. N. Zierler, J. Brillhart, On primitive trinomials (mod 2) (part 2). Inform. Control 14, 566–569 (1969)

    Article  Google Scholar 

  5. R.C. Mullin, I.M. Onyszchuk, S.A. Vanstone, R.M. Wilson, Optimal normal bases in GF(pn). Discrete Appl. Math. 22, 149–161 (1989)

    Article  Google Scholar 

  6. D.E. Knuth, The Art of Computer Programming, Volume 2, Seminumerical Algorithms, 2nd edn. (Addison-Wesley, 1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Duncan Buell .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Buell, D. (2021). Finite Fields of Characteristic 2. In: Fundamentals of Cryptography. Undergraduate Topics in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-73492-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-73492-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-73491-6

  • Online ISBN: 978-3-030-73492-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics