1 Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems 片斷視窗編碼法的分析及應用到 ECC IEEE Transactions on Computers,

Slides:



Advertisements
Similar presentations
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks JaeCheol Ha * and SangJae Moon ** * Korea Nazarene University **
Advertisements

Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations 針對 HIPAA 隱私 / 安全規則的一種密碼金鑰管理方法 IEEE Transactions on Information Technology.
Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick Hitachi Ltd. Katsuyuki Okeya Kouichi Sakurai.
Advanced Information Security 2 SCALAR MULTIPLICATION Dr. Turki F. Al-Somani 2015.
Logic Circuits Another look at Floating Point Numbers Common Combinational Logic Circuits Timing Sequential Circuits Note: Multiplication & Division in.
Advanced in Cryptology – CRYPT 2004, Santa Barbara, August 16, 2004 Signed Binary Representations Revisited Katsuyuki Okeya, Hitachi Katja Schmidt-Samoa,
1 Efficient Algorithms for Elliptic Curve Cryptosystems Original article by Jorge Guajardo and Christof Paar Of WPI ECE Department Presentation by Curtis.
Major Numeric Data Types Unsigned Integers Signed Integer Alphanumeric Data – ASCII & UNICODE Floating Point Numbers.
Congruence Classes Z n = {[0] n, [1] n, [2] n, …, [n - 1] n } = the set of congruence classes modulo n.
Major Numeric Data Types Unsigned Integers Signed Integers Alphanumeric Data – ASCII & UNICODE Floating Point Numbers.
CHES20021 Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n ) A. Gutub, A. Tenca, E. Savas, and C. Koc Information Security.
Radix-r Non-Adjacent Form and Its Application to Pairing- Based Cryptosystem Authors: T. Takagi, D. Reis Jr., S.M. Yen and B.C. Wu IEICE Trans. Fundamentals,
CSE 246: Computer Arithmetic Algorithms and Hardware Design Numbers: RNS, DBNS, Montgomory Prof Chung-Kuan Cheng Lecture 3.
Lecture 8 Floating point format
IWBAT compare and order positive and negative numbers.
Least Common Multiple (LCM)
A prefix-based approach for managing hybrid specifications in complex packet filtering Author: Nizar Ben Neji, Adel Bouhoula Publisher: Computer Networks.
Simple Data Type Representation and conversion of numbers
ES 244: Digital Logic Design Chapter 1 Chapter 1: Introduction Uchechukwu Ofoegbu Temple University.
An Efficient Identity-based Cryptosystem for
Computer Arithmetic Nizamettin AYDIN
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
Numeric precision in SAS. Two aspects of numeric data in SAS The first is how numeric data are stored (how a number is represented in the computer). –
07/19/2005 Arithmetic / Logic Unit – ALU Design Presentation F CSE : Introduction to Computer Architecture Slides by Gojko Babić.
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
New Mexico Computer Science for All Author: Ed Angel Title: Bits and Bytes.
Discrete Methods in Mathematical Informatics Lecture 4: Elliptic Curve Cryptography Implementation(I) 27 th November 2012 Vorapong Suppakitpaisarn
Elliptical Curve Cryptography Manish Kumar Roll No - 43 CS-A, S-7 SOE, CUSAT.
1 Embedding Compression in Chaos- Based Cryptography 嵌入壓縮功能到混亂加密法 IEEE Transactions on Circuits and Systems—II: Express Briefs, VOL. 55, NO. 11, NOV
Lecture12. Outline Binary representation of integer numbers Operations on bits –The Bitwise AND Operator –The Bitwise Inclusive-OR Operator –The Bitwise.
Islamic University Of Gaza, Nael Aburas Data Storage Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
1 Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards 使用在 smart cards 的強韌及高效率密碼驗證金鑰協定 IEEE Transactions on Industrial Electronics,
1 Digitally Signed Document Sanitizing Scheme Based on Bilinear Maps Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai ASIACCS’06, March 21–24, 2006, Taipei,
Discrete Methods in Mathematical Informatics Lecture 5: Elliptic Curve Cryptography Implementation(I) 8 th January 2012 Vorapong Suppakitpaisarn
Elliptic Curve Cryptography
1 Commutative Encryption and Watermarking in Video Compression 交換式加密及浮水印法應用在視頻壓縮 IEEE Transactions on Circuits and Systems for Video Technology, VOL. 17,
AUTHOR: NIZAR BEN NEJI, ADEL BOUHOULA PUBLISHER: IEEE INTERNATIONAL CONFERENCE,2011 PRESENTER: KAI-YANG LIU DATE:2011/08/31 1 NAF Conversion: An Efficient.
IT11004: Data Representation and Organization Floating Point Representation.
Security of Using Special Integers in Elliptic Scalar Multiplication Mun-Kyu Lee o Jin Wook Kim Kunsoo Park School of CSE, Seoul National University.
In The Name of Allah Fault attacks on ECC
1 Cryptanalysis Lab Elliptic Curves. Cryptanalysis Lab Elliptic Curves 2 Outline [1] Elliptic Curves over R [2] Elliptic Curves over GF(p) [3] Properties.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Motivation Basis of modern cryptosystems
COMPUTER ORGANISATION.. LAB. تنظيم الحاسبات.. عملي
Sanitizable Signatures ESORICS 2005, LNCS 3679, pp. 159–177, Springer-Verlag Berlin Heidelberg 2005 Author: Giuseppe Ateniese, Daniel H. Chou, Breno.
Number Systems Decimal Can you write 12,045 in expanded form? Base? Allowable digits for each place?
Network Security Design Fundamentals Lecture-13
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
The Basic Properties of
A Concrete Certificateless Signature Scheme without Pairings
Sanitizable and Deletable Signature
© The Author(s) Published by Science and Education Publishing.
CSE 102 Introduction to Computer Engineering
Elliptic Curves.
Lecture 10: Floating Point, Digital Design
Introduction to Integers; Signed Numbers
MMNSS COLLEGE,KOTTIYAM DEPARTMENT OF PHYSICS
MIRACL & PBC Yung-Hsiang Liu.
Numbers representations
Cryptology Design Fundamentals
COMS 161 Introduction to Computing
IT11004: Data Representation and Organization
Signed Binary Representations Revisited
Network Security Design Fundamentals Lecture-13
An Image Quality Evaluation Method Based on Digital Watermarking
Presentation transcript:

1 Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems 片斷視窗編碼法的分析及應用到 ECC IEEE Transactions on Computers, VOL. 55, NO. 1, JAN 2006 Author : Katja Schmidt-Samoa, Olivier Semay, and Tsuyoshi Takagi Adviser :鄭錦楸, 郭文中 教授 Reporter :林彥宏

2 Outline Introduction Elliptic curve cryptography (ECC) Nonadjacent Form (NAF) window NAF (wNAF) mutual opposite form (MOF) window MOF (wMOF) Fractional wNAF Fractional wMOF Conclusions

3 Introduction(1/13) Elliptic curve cryptography (ECC) shorter key-size and faster computation suitable for small-memory device Time of crack (ns)RSA bit-lengthECC bit-lengthRSA/ECC : 1 6 : 1 7 : 1 10 : 1 35 : 1

4 Introduction(4/13) Elliptic curve on prime field ECADD ECDBL

5 Introduction(2/13) EC Doubling (ECDBL) EC Addition (ECADD)

6 Introduction(3/13) Scalar Multiplication –Binary Method 1. 2.For down to ECDBL if, ECADD 3.Return binary representation Ex. D D DADADA

7 Introduction(5/13) Example: {O, (2,4), (2,7), (3,5), (3,6), (5,2), (5,9), (7,2), (7,9), (8,3), (8,8), (10,2), (10,9)}

8 Introduction(6/13) Nonadjacent Form (NAF) Input: A positive integer Output: A signed digit representation

9 Introduction(7/13) Example: =

10 Introduction(8/13) window NAF (wNAF) –The most significant non-zero bit is positive. –Among any consecutive digits, at most one is non- zero. –Each non-zero digit is odd and less than in absolute value.

11 Introduction(9/13)

12 Introduction(10/13) Example: w=5

13 Introduction(11/13) mutual opposite form (MOF) recoding stage can be done Left-to-Right –The signs of adjacent non-zero bits (without considering 0 bits) are opposite. –The most non-zero bit and the least non-zero bit are 1 and -1, respectively.

14 Introduction(12/13) Example:

15 Introduction(13/13) window MOF(wMOF) - The most significant non-zero bit is positive. - Each non-zero digit is odd and less than in absolute value. EX :

16 Fractional wNAF w=2 | 0 3| 0| 1 0| 0 3| 0 0| 0 3| 0 0| 0 3| 1 0| 1 0| 0| 0 3| 0 1 w=3 | 0 3 0| 0 0 5| 1 0 0| 0 3 0| 0| 0 0 7| 0 |1 0 0| 0 3 0| 1

17 Fractional wMOF First Phase: the table entries are precompute Second Phase: merges recoding and evaluation

18 conclusions proved that the proposed Frac-wMOF has the same nonzero density as Frac-wNAF using identical table sizes Frac-wMOF recoding requiring less working memory than the Frac-wNAF approach