Advanced Information Security 3 PROJECTIVE COORDINATES Dr. Turki F. Al-Somani 2015.

Slides:



Advertisements
Similar presentations
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
Advertisements

Advanced Information Security 2 SCALAR MULTIPLICATION Dr. Turki F. Al-Somani 2015.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 11–5) CCSS Then/Now New Vocabulary Key Concept:Add or Subtract Rational Expressions with Like.
Advanced Information Security 4 Field Arithmetic
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Cryptography and Network Security Chapter 4
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 4–2) CCSS Then/Now New Vocabulary Key Concept: Point-Slope Form Example 1:Write and Graph an.
Algebra 2 Bell-work 10/14/2014 Multiple Choice: Which set of ordered pairs is a solution to the system? 4x + 2y = 4 6x + 2y = 8 A. (7,5)B. (2,4)C. (2,-2)D.
CPSC 3730 Cryptography and Network Security
1 Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 4 – Finite Fields.
Nonhomogeneous Linear Differential Equations
Cryptography and Network Security Introduction to Finite Fields.
§ 4.5 Multiplication of Polynomials. Angel, Elementary Algebra, 7ed 2 Multiplying Polynomials To multiply a monomial by a monomial, multiply their coefficients.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 8–2) CCSS Then/Now New Vocabulary Example 1: The Distributive Property Key Concept: FOIL Method.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 8–3) CCSS Then/Now Key Concept: Square of a Sum Example 1:Square of a Sum Key Concept: Square.
Example 1 The Distributive Property A. Find (y + 8)(y – 4). Vertical Method Multiply by –4. y + 8 (×) y – 4 –4y – 32–4(y + 8) = –4y – 32 Multiply by y.
By: Hector L Contreras SSGT / USMC
Splash Screen. Then/Now You wrote linear equations given either one point and the slope or two points. Write equations of lines in point-slope form. Write.
Chapter 5 Factoring and Algebraic Fractions
Advanced Information Security 1 INTRODUCTION TO ECC Dr. Turki F. Al-Somani
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
MATH 31 LESSONS PreCalculus 1. Simplifying and Factoring Polynomials.
Commutative and Associative Properties Return to table of contents.
Chapter 4 – Finite Fields
GOAL: MULTIPLY TWO POLYNOMIALS TOGETHER USING THE DISTRIBUTIVE PROPERTY ELIGIBLE CONTENT: A Multiplying Polynomials.
Data Security and Encryption (CSE348) 1. Lecture # 12 2.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 8–7) CCSS Then/Now New Vocabulary Key Concept: Difference of Squares Example 1:Factor Differences.
Partial Fractions. Understand the concept of partial fraction decomposition. Use partial fraction decomposition with linear factors to integrate rational.
Concept 1 Example 1 Write and Graph an Equation in Point-Slope Form (x 1, y 1 ) = (–2, 0) Point-slope form Answer: Write the point-slope form of an equation.
1.3 Segments and Their Measures. Objectives/Assignment Use segment postulates. Use the Distance Formula to measure distances as applied.
Information Security Lab. Dept. of Computer Engineering 87/121 PART I Symmetric Ciphers CHAPTER 4 Finite Fields 4.1 Groups, Rings, and Fields 4.2 Modular.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 4–2) CCSS Then/Now New Vocabulary Key Concept: Point-Slope Form Example 1:Write and Graph an.
Multiplying Powers Dividing Powers Zero ExponentsNegative.
A Valentines Day Problem Source The teachers lab Patterns in Mathematics
Introduction to Elliptic Curves CSCI 5857: Encoding and Encryption.
Instructor: Mircea Nicolescu Lecture 9
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
LESSON 3-2 ANGLES AND PARALLEL LINES. Concept Example 1 Use Corresponding Angles Postulate A. In the figure, m  11 = 51. Find m  15.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 8–2) CCSS Then/Now New Vocabulary Example 1: The Distributive Property Key Concept: FOIL Method.
Motivation Basis of modern cryptosystems
Splash Screen Unit 8 Quadratic Expressions and Equations EQ: How do you use addition, subtraction, multiplication, and factoring of polynomials in order.
 An equation of a line can be written in point-slope form when given the coordinates of one known point on a line and the slope of that line.  The linear.
Fractions Addition, Subtraction, Multiplication and Division June 25, 2016June 25, 2016June 25, 2016.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
BELL RINGER. MULTIPLYING A MONOMIAL BY A POLYNOMIAL.
[Default] [MC Any] [MC All] [Default] [MC Any] [MC All]
Splash Screen. Lesson Menu Five-Minute Check (over Lesson 8–3) CCSS Then/Now Key Concept: Square of a Sum Example 1:Square of a Sum Key Concept: Square.
Splash Screen Unit 8 Quadratic Expressions and Equations EQ: How do you use addition, subtraction, multiplication, and factoring of polynomials in order.
Visualizing Vector fields
Modeling Transformations
Advanced Information Security 5 ECC Cryptography
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
Advanced Information Security 6 Side Channel Attacks
Elliptic Curves.
Copyright © Cengage Learning. All rights reserved.
PROPORTIONAL SEGMENTS & BASIC SIMILARITY THEOREM
Combinations COURSE 3 LESSON 11-3
Elements in Eliminated Jacobian = 133,515
Elements in Eliminated Jacobian = 133,515
Angle relationships in circles.
Lesson 4-1 Using Properties Designed by Skip Tyler, Varina High School
FIELD.
Inverse of a Matrix Solving simultaneous equations.
Vectors (2).
Screw Rotation and Other Rotational Forms
Mathematical Background: Extension Finite Fields
Presentation transcript:

Advanced Information Security 3 PROJECTIVE COORDINATES Dr. Turki F. Al-Somani 2015

Module Outlines 2  Why Projective Coordinates ?  Which Projective Coordinates ?  Homogeneous,  Jacobian,  Lopez-Dahab,  Mixed,  and Edwards coordinate systems  Summary

Why Projective Coordinates ? 3  The group operations in an affine coordinate system involve finite field inversion, which is a very costly operation, particularly over prime fields.  Projective coordinate systems are used to reduce the need for performing inversion to only 1.  Several projective coordinate systems have been proposed:  Homogeneous, Jacobian, Lopez-Dahab, Mixed and Edwards coordinate systems

Which Projective Coordinate ? 4  The selection of a projective coordinate is based on the number of arithmetic operations, mainly multiplications.  This is to be expected due to the sequential nature of these architectures where a single multiplier is used.  For high performance implementations, such sequential architectures are too slow to meet the demand of increasing number of operations.  One solution for meeting this requirement is to exploit the inherent parallelism within the elliptic curve point operations in projective coordinate

Homogeneous Coordinates 5  For the Homogeneous, so called projective, coordinate system, an elliptic curve point P takes the form (x, y) = (X/Z, Y/Z).  Let P 1, P 2 and P 3 be three different points on the elliptic curve over GF(p), where P 1 =(X 1, Y 1, Z 1 ), P 2 =(X 2, Y 2, Z 2 =1) and P 3 =(X 3, Y 3, Z 3 ).  Point addition with the Homogenous coordinate systems can be computed as: A=Y 2 Z 1, B=X 2 Z 1 − X 1, C=A 2 Z 1 − B 3 − 2B 2 X 1, X 3 =BC, Y 3 =A(B 2 X 1 − C) − B 3 Y 1, Z 3 =B 3 Z 1.

Homogeneous Coordinates (contd.) 6  Point doubling, on the other hand, can be computed as: A=aZ X 1 2, B=Y 1 Z 1, C=X 1 Y 1 B, D=A 2 − 8C, X 3 =2BD, Y 3 =A(4C − D) − 8Y 1 2 B 2, Z 3 =8B 3.

Jacobian Coordinates 7  For the Jacobian coordinate system, P takes the form (x, y) = (X/Z 2, Y/Z 3 ).  Point addition can be computed as: A=X 1, B=X 2 Z 1 2, C=Y 1, D=Y 2 Z 1 3, E=B − A, F=D − C, X 3 =F 2 –(E3+2AE2), Y3=F(AE 2 − X 3 ) − CE 3, Z 3 =Z 1 E.  Point doubling, on the other hand, can be computed as: A=4X 1 Y 1 2, B=3X 1 2 +aZ 1 4, X 3 =B 2 − 2A, Y 3 =B(A − X 3 ) − 8Y 1 4, Z 3 =2Y 1 Z 1.

Lopez-Dahab Coordinates 8  Lopez-Dahab coordinate system takes the form (x,y)=(X/Z,Y/Z 2 ).  Very efficient in GF(2 m )  Point addition can be computed as: A 0 =Y 1 2 Z 1 2, A 1 =Y 1 Z 2 2, B 0 =X 2 Z 1, B 1 =X 1 Z 2, C=A 0 +A 1, D=B 0 +B 1, E=Z 1 Z 2, F=DE, Z 3 =F 2, G=D 2 (F+aE 2 ), H=CF, X 3 =C 2 +H+G, I=D 2 B 0 E+X 3, J=D 2 A 0 +X 3, Y 3 =HI+Z 3 J.  Point doubling can be computed as: Z 3 =Z 1 2 X 1 2, X 3 =X 1 4 +bZ 1 4, Y 3 =bZ 1 4 Z 3 +X 3 (aZ 3 +Y 1 2 +bZ 1 4 )

Mixed Coordinates 9  The Mixed coordinate system adds two points where one is given in some coordinate system while the other in another coordinate system.  The coordinate system of the resulting point, may be in a third coordinate system

Mixed Coordinates (contd.) 10

Edwards Coordinates 11  Recently, Edwards showed that all elliptic curves over prime fields could be transformed to the shape: x 2 + y 2 = c 2 (1 + x 2 y 2 ), with (0, c) as neutral element and with the surprisingly simple and symmetric addition law of two points P 1 = (x 1, y 1 ) and P 2 = (x 2, y 2 ) as:

Edwards Coordinates (contd.) 12  To capture a larger class of elliptic curves over the original field, the notion of Edwards form have been modified to include all curves x 2 + y 2 = c 2 (1 + dx 2 y 2 ) where cd(1 − dc 4 ) ≠ 0.  Point addition with the Edwards coordinate systems can be computed as: B=Z 1 2 Z 1, C=X 1 X 2, D=Y 1 Y 2, E=G– (C+D), F=dCD, G=(X 1 +Y 1 )(X 2 +Y 2 ), X 3 =Z 1 E(B–F), Z 3 =(B–F)(B+F), Y 3 =Z 1 (D–C)(B+F).  Point doubling, on the other hand, can be computed as: A=X 1 +Y 1, B=A 2, C=X 1 2, D=Y 1 2, E=C+D, F=B–E, H=Z 1 2, I=2H, J=E–I, X 3 =FJ, Z 3 =EJ, Y 3 =E(C–D).

Inherent Parallelism (2006) 13

Inherent Parallelism (2006) 14

Inherent Parallelism (2006) 15

Inherent Parallelism (2010) 16

Inherent Parallelism (2010) 17

Inherent Parallelism (2010) 18

Inherent Parallelism (2013) 19

Inherent Parallelism (2013) 20

Summary 21  The projective coordinate systems are used to eliminate the need for performing inversion.  For elliptic curves, many different forms of formulas are found for point addition and doubling.  The selection of a specific projective coordinate systems depends on:  Time  Inherent parallelism.

THANKS & GOOD LUCK NEXT IS: 4 FIELD ARITHMETIC Dr. Turki F. Al-Somani 2015