Montgomery multiplication Algorithm Mohammad Farmani Under supervision of : Dr. S. Bayat-sarmadi 2 nd. Semister, Sharif University of Technology 1
2 Main Topic Montgomery modular multiplication algorithm Main Article: “Montgomery Multiplication in GF(2 k )” Written by: Cetin K. KOC and Tolga Acar,1998 Copyright © 2014 Hardware Security and Trust
Outline Introduction Montgomery modular multiplication of integers Montgomery modular multiplication in GF(2 k ) Conclusion Montgomery multiplication algorithm Sharif University of Technology 3 Copyright © 2014 Hardware Security and Trust
The importance and applications of the arithmetic operations in the Galois field GF(2 k ) in : Coding theory Computer algebra Cryptography …. Importance of the exponentiation Using a series of multiplication for The exponentiation Montgomery multiplication algorithm Sharif University of Technology 4 Copyright © 2014 Hardware Security and Trust
Cryptographic applications require fast arithmetic operations Proposed an effective modular multiplication of integers by P.L. Montgomery 1985 Conversion to the Montgomery domain : a : an intger M : modulus r : Radix Montgomery multiplication algorithm Sharif University of Technology 5 Copyright © 2014 Hardware Security and Trust
Example: M = 11, r = 2 4 = 16 There is a one-to-one correspondence between integers and Montgomery residues for 0 < a < M-1 Montgomery multiplication algorithm Sharif University of Technology 6 Copyright © 2014 Hardware Security and Trust
Outline Introduction Montgomery modular multiplication of integers Montgomery modular multiplication in GF(2 k ) Conclusion Montgomery multiplication algorithm Sharif University of Technology 7 Copyright © 2014 Hardware Security and Trust
Define: r -1 is the inverse of r mod M: r -1 r = 1 (mod M) Montgomery multiplication algorithm Sharif University of Technology 8 Copyright © 2014 Hardware Security and Trust
Example : Montgomery multiplication algorithm Sharif University of Technology 9 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 10 Copyright © 2014 Hardware Security and Trust
Example : Z initially 0 Z = ( ) / 2 = 8 Z = ( ) / 2 = 12 Z = ( ) / 2 = 14 Z = (14 + 0) / 2 = 7 (final result) Montgomery multiplication algorithm Sharif University of Technology 11 Copyright © 2014 Hardware Security and Trust X = 7 = 0111 Y = 5 = 0101 M = 11 = 1011 Z = 0 for i = 0 to n-1 Z = Z + xiY if Z is odd then Z = Z + M Z = Z/2 if Z ≥ M then Z = Z – M
Conversion using MM Conversion of integers to/from Montgomery residues with one MM operation Montgomery multiplication algorithm Sharif University of Technology 12 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 13 Copyright © 2014 Hardware Security and Trust MM x r2r2 X’X’ X’ 1 X
Outline Introduction Montgomery modular multiplication of integers Montgomery modular multiplication in GF(2 k ) Conclusion Montgomery multiplication algorithm Sharif University of Technology 14 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 15 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 16 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 17 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 18 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 19 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 20 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 21 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 22 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 23 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 24 Copyright © 2014 Hardware Security and Trust
Outline Introduction Montgomery modular multiplication of integers Montgomery modular multiplication in GF(2 k ) Conclusion Montgomery multiplication algorithm Sharif University of Technology 25 Copyright © 2014 Hardware Security and Trust
Montgomery multiplication algorithm Sharif University of Technology 26 Copyright © 2014 Hardware Security and Trust
End of presentation, Any question?