TAILIEUCHUNG - Cryptographic Algorithms on Reconfigurable Hardware- P12

Cryptographic Algorithms on Reconfigurable Hardware- P12: This chapter presents a complete outhne for this Book. It explains the main goals pursued, the strategies chosen to achieve those goals, and a summary of the material to be covered throughout this Book. | 310 10. Elliptic Curve Cryptography Fig. . An illustration of the t and r 1 Abelian Groups with m an Even Number In other words the r and the r-1 operators generate an Abelian group of order m as is depicted in Fig. . Considering an arbitrary element A e GF 2m with m even Fig. illustrates in the clockwise direction all the m elliptic curve points that can be generated by repeatedly computing the t operator . r P for i 0 1 m- 1. On the other hand in the counterclockwise direction Fig. illustrates all the m points that can be generated by repeatedly computing the r-1 operator . t P for i 0 1 m 1. Frobenius Operator Applied on Koblitz Curves Koblitz curves exhibit the property that if P x y is a point in Ea then so is the point z2 t 2 338 . Moreover it has been shown that x4 y4 2 x y p x2 y2 for every x y on Ea where p I 1 . Therefore using the Frobenius notation we can write the relation r rP 2P r2 2 P prP. Notice that last equation implies that a point doubling can be computed by applying twice the r Frobenius operator to the point P followed by a point 13 Lagrange theorem can be used to prove the Fermat s little theorem and its generalization Euler s theorem studied in Chapter 4 Please purchase PDF Split-Merge on to remove this watermark. Koblitz Curves 311 addition of the points jltP and t2P. Let us recall that the Frobenius operator is an inexpensive operation since field squaring is a linear operation in binary extension fields. By solving the quadratic Eq. for r we can find an equivalence between a squaring map and the scalar multiplication with the complex number t It can be shown that any positive integer k can be reduced modulo rm 1. Hence a r-adic non-adjacent form rNAF of the scalar k can be produced as i-i i 0 where each m 0 1 and I is the expansion s length. The scalar multiplication kP can then be computed with an equivalent non-adjacent form NAF addition-subtraction method. Standard NAF .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.