DocumentCode :
1373556
Title :
Look-up table-based large finite field multiplication in memory constrained cryptosystems
Author :
Hasan, M. Anwarul
Author_Institution :
Dept. of Electr. & Comput. Eng., Waterloo Univ., Ont., Canada
Volume :
49
Issue :
7
fYear :
2000
fDate :
7/1/2000 12:00:00 AM
Firstpage :
749
Lastpage :
758
Abstract :
Many cryptographic systems use multiplication in the finite field GF(2n) for their underlying computations. In the recent past, a number of look-up table-based algorithms have been proposed for the software implementation of GF(2n) multiplication. Look-up table-based algorithms can provide speed advantages, but they either require a large memory space or do not fully utilize the resources of the processor on which the software is executed. In this work, an algorithm for GF(2n) multiplication is proposed which can alleviate this problem. In each iteration of the proposed algorithm, a group of bits of one of the input operands are examined and two look-up tables are accessed. The groupsize determines the table sizes, but does not affect the utilization of the processor resources. It can be used for both software and hardware realizations and is particularly suitable for implementations in memory constrained environment, such as smart cards and embedded cryptosystems
Keywords :
cryptography; digital arithmetic; table lookup; cryptographic systems; finite field multiplication; look-up table; memory constrained cryptosystems; multiplication; Arithmetic; Elliptic curve cryptography; Embedded software; Galois fields; Hardware; Helium; Polynomials; Smart cards; Software algorithms; Table lookup;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/12.863045
Filename :
863045
Link To Document :
بازگشت