REDUCING INVERSION PROCESSES OF POINT ADDITION TO SPEED UP ELLIPTIC CURVE CRYPTOGRAPHY
Main Article Content
Abstract
Abstract
In this paper, a modified algorithm for an affine coordinate system is proposed to speed up encryption and decryption processes in elliptic curve cryptography (ECC). In fact, inversion, squaring and multiplication are the main processes for both point addition and point doubling. For three different processes, the inversion process has the highest cost. In the related works, to find 8P where P is represented as a point on curve, at least two inversion processes are needed to perform this task. On the other hand, the proposed method requires only one inversion process to compute 8P. The experimental results show that the proposed method can perform the process faster than 2(4P) method. In general, the method is suitable for computing R = kP, where k = 8i + j and j is a small integer. Moreover, the proposed method also can be chosen to apply with Ternary/Binary Approach which is an improved point multiplication method to speed up ECC.
Article Details
References
Rivest, R. L., Shamir, A., & Adleman, L. (1978). “ method for obt ining digit l sign tures nd public e cr ptos stems”, Communications of ACM, vol. 21, pp. 120 – 126.
Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computation, vol.48, pp. 203-209.
Miller, V. S. (1985). Use of Elliptic Curves in Cryptography, Advances in r ptolog ”. Proceedings of CRYPTO85, LNCS-218, pp. 417-426.
Prasana, Y. L., & Reddy, E. M. (2017). A Theoretical Study of Elliptic Curve Cryptography for Location Based Services, Proceeding of 7th International Conference on Big Data Analytics and Computational Intelligenc, Chirala, India. pp.404-407.
Elbirt, A. J. (2009). Under Standing and Applying Cryptography and Data Security. USA: Auer-bach Publications.
Amara, M., & Said, A. (2011). Elliptic Curve Cryptography and Its Applications, Proceeding of 7th International Workshop on Systems, Signal Processing and their Applications, Tipaza, Algeria. pp. 247-250.
Karthikeyan, E. (2012). Survey of Elliptic Curve Scalar Multiplication Algorithms, Int. J. Advanced Networking and Applications, 4, 1581 – 1590.
Ciet, M., Joye, M., Lauter, K., & Montgomery, P. L. (2006). Trading Inversions for Multiplications in Elliptic Curve Cryptography, Designs, Codes and Cryptography, vol. 39, 189-206.
Eisentrager, K., Lauter, K., & Montgomery, P. L. (2003). Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation, Lecture Notes in Computer Science, vol.2612, pp. 343-354.
Li, Y., & Feng, L. (2011). Overview of Scalar Multiplication in Elliptic Curve Cryptography. Proceedings of International Conference on Computer Science and Network Technology, pp. 2670 – 2673, Harbin, China.
Deligiannidis, L. (2015). Elliptic curve cryptography in Java. Proceedings of International Conference on Intelligence and Security Informatics, pp. 193 – 193, MD, USA.