Radix-r Non-Adjacent Form and Its Application to Pairing- Based Cryptosystem Authors: T. Takagi, D. Reis Jr., S.M. Yen and B.C. Wu IEICE Trans. Fundamentals,

Slides:



Advertisements
Similar presentations
Data Representation COE 202 Digital Logic Design Dr. Aiman El-Maleh
Advertisements

Lecture Implementations. The efficiency of a particular cryptographic scheme based on any one of the algebraic structures will depend on a number.
Chapter 2: Data Representation
Advanced Information Security 2 SCALAR MULTIPLICATION Dr. Turki F. Al-Somani 2015.
Advanced Information Security 4 Field Arithmetic
Advanced in Cryptology – CRYPT 2004, Santa Barbara, August 16, 2004 Signed Binary Representations Revisited Katsuyuki Okeya, Hitachi Katja Schmidt-Samoa,
Data-Centric Energy Efficient Scheduling for Densely Deployed Sensor Networks IEEE Communications Society 2004 Chi Ma, Ming Ma and Yuanyuan Yang.
The Design and Analysis of Algorithms
Projects CE 311K Introduction to Computer Methods.
Lecture 8 Floating point format
Montgomery multiplication Algorithm Mohammad Farmani Under supervision of : Dr. S. Bayat-sarmadi 2 nd. Semister, Sharif University of Technology.
A prefix-based approach for managing hybrid specifications in complex packet filtering Author: Nizar Ben Neji, Adel Bouhoula Publisher: Computer Networks.
Selecting a to Eliminate Carry Chain in SD For no carry, require.
General Fixed Radix Number Systems Nonredundant Positive radix, ß n digits in digit set Vector:
Decimal Number System We are used to the decimal number system which is a positional number system The decimal number 4386 represents the value: 41000.
2-1 Chapter 2 - Data Representation Principles of Computer Architecture by M. Murdocca and V. Heuring © 1999 M. Murdocca and V. Heuring Chapter Contents.
1 Number SystemsLecture 8. 2 BINARY (BASE 2) numbers.
A Low-Power CAM Design for LZ Data Compression Kun-Jin Lin and Cheng-Wen Wu, IEEE Trans. On computers, Vol. 49, No. 10, Oct Presenter: Ming-Hsien.
Complement Numbers. Outline  Negative Numbers Representation  Sign-and-magnitude  1s Complement  2s Complement  Comparison of Sign-and-Magnitude.
CE1111 :Digital Logic Design lecture 01 Introduction Dr. Atef Ali Ibrahim.
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Number Systems and Codes. CS2100 Number Systems and Codes 2 NUMBER SYSTEMS & CODES Information Representations Number Systems Base Conversion Negative.
Integer Representation for People Computer Organization and Assembly Language: Module 3.
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Discrete Methods in Mathematical Informatics Lecture 5: Elliptic Curve Cryptography Implementation(I) 8 th January 2012 Vorapong Suppakitpaisarn
Some Security Aspects of the Randomized Exponentiation Algorithm (Bradford, UK) Colin D. Walter M IST.
Han Liu Supervisor: Seok-Bum Ko Electrical & Computer Engineering Department 2010-Mar-9.
UniMAP Sem2-10/11 DKT121: Fundamental of Computer Programming1 Number Systems and Bitwise Operation.
CEC 220 Digital Circuit Design Binary Codes
AUTHOR: NIZAR BEN NEJI, ADEL BOUHOULA PUBLISHER: IEEE INTERNATIONAL CONFERENCE,2011 PRESENTER: KAI-YANG LIU DATE:2011/08/31 1 NAF Conversion: An Efficient.
ELEN 033 Lecture #5 Tokunbo Ogunfunmi Santa Clara University.
DIGITAL SYSTEMS Number systems & Arithmetic Rudolf Tracht and A.J. Han Vinck.
Overview of Residue Number System (RNS) for Advanced VLSI Design and VLSI Signal Processing NTUEE 吳安宇.
1 Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems 片斷視窗編碼法的分析及應用到 ECC IEEE Transactions on Computers,
Security of Using Special Integers in Elliptic Scalar Multiplication Mun-Kyu Lee o Jin Wook Kim Kunsoo Park School of CSE, Seoul National University.
Module –I Codes: Weighted and non-weighted codes
SPIHT algorithm combined with Huffman encoding Wei Li, Zhen Peng Pang, Zhi Jie Liu, 2010 Third International Symposium on Intelligent Information Technology.
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Lecture 1.2 (Chapter 1) Prepared by Dr. Lamiaa Elshenawy
DATA REPRESENTATION Data Types Complements Fixed Point Representations
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Motivation Basis of modern cryptosystems
Dr. ClincyLecture 2 Slide 1 CS Chapter 2 (1 of 5) Dr. Clincy Professor of CS Note: Do not study chapter 2’s appendix (the topics will be covered.
CS2100 Computer Organisation
Data Representation COE 308 Computer Architecture
Data Representation ICS 233
Overview Introduction Data representation Fixed Point Representation
The Design and Analysis of Algorithms
Data Representation in Computer Systems
Overview of Residue Number System (RNS) for Advanced VLSI Design and VLSI Signal Processing NTUEE 吳安宇.
Number Systems Lab session 1 Xuan Guo.
CS1010 Programming Methodology
NUMBER SYSTEMS – PART I ICT1001 – I NTRODUCTION TO ICT L ECTURE 2.
Affiliation of presenter
Source: Ad Hoc Networks, Vol. 71, pp , 2018
Number systems and codes
C Model Sim (Fixed-Point) -A New Approach to Pipeline FFT Processor
Source: IEEE Access, Vol. 6, Dec. 2017, pp
Parallel sorting.
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: IEEE Signal Processing Letters, Vol. 14, No. 3, Mar. 2007, pp
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
COMS 161 Introduction to Computing
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
A Distributed Sign-and-Encryption for Anonymity
Table 2. Showing mean and SD along with t- critical ratio
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Pattern Recognition Letters, VOL. 27, Issue 13, October 2006
Data Representation COE 308 Computer Architecture
Presentation transcript:

Radix-r Non-Adjacent Form and Its Application to Pairing- Based Cryptosystem Authors: T. Takagi, D. Reis Jr., S.M. Yen and B.C. Wu IEICE Trans. Fundamentals, vol. E89-A, No.1 January Presented by J. Liu

Outline Introduction Generalized Non-Adjacent Form (gNAF) Radix-r NAF (rNAF) Width-w radix-r NAF (wrNAF) Generalized Sliding Window Form (gSWF) Comparisons Example of gNAF rNAF and gSWF Conclusion

Introduction The radix-3 representation can be used for efficient implementation in pairing based cryptosystem.

Generalized Non Adjacent Form Radix-r representation Hamming weight of radix-r rep. is the number of non-zero digits. { density (r-1)/r} Signed radix-r rep. gNAF : { density (r-1)/(r+1)} –  d i +d i+1  <r for all i, –  d i  <  d i+1  if d i d i+1 <0

Radix-r NAF r-NAF of d =(d n-1, d n-2,…, d 0 ) –d j d j-1 =0 for j = 0, 1, …, n, where d n = d -1 =0 –d j  D r = {0,  1,  2,…,  floor[(r 2 -1)/2]}\{  r,  2r,…} –The leftmost non-zero digit is positive Convert (e j, e j-1 ), where e j-1  0, to r-NAF –If e j r+ e j-1 < r 2 /2, then (0, e j r+ e j-1 ) –else (1,0, (e j r+ e j-1 )-r 2 ) {density (r-1)/(2r-1)} proved by Markov chain

Example d mods r: –If d mod r  r/2 then d mods r = (d mod r)-r –else d mods r = d mod r d = 97, r=5 (4, 0, -3) cd 0  d mods r 2 = (97 mod 25)-25 = -3 d  d-(-3)=100, d  d/r=100/5=20 cd 1  0 (20 mod 5 = 0) d  d/r=20/5=4 cd 1  d mods r 2 = 4 mods 25 = 4

Width-w radix-r NAF wr-NAF of d =(d n-1, d n-2,…, d 0 ) –At most 1 non-zero digit among any w adjacent digits –d j  D w,r = {0,  1,  2,…,  floor[(r w -1)/2]}\{  r,  2r,…} –The leftmost non-zero digit is positive. {density (r-1)/(w(r-1)+1)}

Generalized Sliding Window Form Space-time trade-off At most 1 non-zero digit among a width-w sliding window. Convert the w-consecutive by the conversion table.

Conversion table (1,0~)→(1,0~),…, (r-1,0~)→(r-1,0~) (1,1,0~)→(0,r+1,0~), (1,2,0~)→(0,r+2,0~)… (2,1,0~)→(0,2r+1,0~), (2,2,0~)→(0,2r+2,0~) (r-1,1,0~)→(0,r 2 -r+1,0~), (r-1,r-1,0~)→(0, r 2 -1,0~),… (r-1, r-1, r-1,0~)→(0,0,r 3 -1,0~),… (r-1,r-1,…,r-1)→(0,0,…, r w -1)

Comparisons

Conclusion For radix-3, the proposed algorithm with width-w =2 attains non-zero density 0.4 with two additional digits, where g-NAF has 0.5 with one additional digit. The radix-r representation is used for the efficient computation of pairing-based cryptosystem.