Title :
Look-up table-based large finite field multiplication in memory constrained cryptosystems
Author :
Hasan, M. Anwarul
Author_Institution :
Dept. of Electr. & Comput. Eng., Waterloo Univ., Ont., Canada
fDate :
7/1/2000 12:00:00 AM
Abstract :
Many cryptographic systems use multiplication in the finite field GF(2n) for their underlying computations. In the recent past, a number of look-up table-based algorithms have been proposed for the software implementation of GF(2n) multiplication. Look-up table-based algorithms can provide speed advantages, but they either require a large memory space or do not fully utilize the resources of the processor on which the software is executed. In this work, an algorithm for GF(2n) multiplication is proposed which can alleviate this problem. In each iteration of the proposed algorithm, a group of bits of one of the input operands are examined and two look-up tables are accessed. The groupsize determines the table sizes, but does not affect the utilization of the processor resources. It can be used for both software and hardware realizations and is particularly suitable for implementations in memory constrained environment, such as smart cards and embedded cryptosystems
Keywords :
cryptography; digital arithmetic; table lookup; cryptographic systems; finite field multiplication; look-up table; memory constrained cryptosystems; multiplication; Arithmetic; Elliptic curve cryptography; Embedded software; Galois fields; Hardware; Helium; Polynomials; Smart cards; Software algorithms; Table lookup;
Journal_Title :
Computers, IEEE Transactions on