Addition chain heuristics in application to elliptic curve cryptosystems

The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed, Mohamad Afendee, Shawai, Yahaya Garba, Derahman, Mohd Noor, Mamat, Abd Rasid, Mohd Satar, Siti Dhalila, Amri Abidin, Ahmad Faisal, Abdul Kadir, Mohd Fadzil
Format: Article
Language:English
Published: Intelektual Pustaka Media Utama 2024
Online Access:http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf
http://psasir.upm.edu.my/id/eprint/113090/
https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.113090
record_format eprints
spelling my.upm.eprints.1130902024-11-15T09:08:14Z http://psasir.upm.edu.my/id/eprint/113090/ Addition chain heuristics in application to elliptic curve cryptosystems Mohamed, Mohamad Afendee Shawai, Yahaya Garba Derahman, Mohd Noor Mamat, Abd Rasid Mohd Satar, Siti Dhalila Amri Abidin, Ahmad Faisal Abdul Kadir, Mohd Fadzil The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind an optimal addition chain that includes the theoretical boundary for the upper limit and lower limit which laid the foundation for experimentation hereafter. In the following, we examine different addition chain solutions that were used to increase efficiency in scalar multiplication. To avoid any possible confusion, we intentionally separated the discussion into two modules called integer recoding method and chain generator based on the heuristics method. These methods were developed by considering various aspects such as the space within which the operation is executed, the curve that is selected, the formulation to express the original equation, and the choices of operation and arithmetic, all together to improve operational efficiency. Intelektual Pustaka Media Utama 2024 Article PeerReviewed text en cc_by_sa_4 http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf Mohamed, Mohamad Afendee and Shawai, Yahaya Garba and Derahman, Mohd Noor and Mamat, Abd Rasid and Mohd Satar, Siti Dhalila and Amri Abidin, Ahmad Faisal and Abdul Kadir, Mohd Fadzil (2024) Addition chain heuristics in application to elliptic curve cryptosystems. International Journal of Advances in Applied Sciences, 13 (3). pp. 546-555. ISSN 2252-8814; eISSN: 2722-2594 https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103 10.11591/ijaas.v13.i3.pp546-555
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind an optimal addition chain that includes the theoretical boundary for the upper limit and lower limit which laid the foundation for experimentation hereafter. In the following, we examine different addition chain solutions that were used to increase efficiency in scalar multiplication. To avoid any possible confusion, we intentionally separated the discussion into two modules called integer recoding method and chain generator based on the heuristics method. These methods were developed by considering various aspects such as the space within which the operation is executed, the curve that is selected, the formulation to express the original equation, and the choices of operation and arithmetic, all together to improve operational efficiency.
format Article
author Mohamed, Mohamad Afendee
Shawai, Yahaya Garba
Derahman, Mohd Noor
Mamat, Abd Rasid
Mohd Satar, Siti Dhalila
Amri Abidin, Ahmad Faisal
Abdul Kadir, Mohd Fadzil
spellingShingle Mohamed, Mohamad Afendee
Shawai, Yahaya Garba
Derahman, Mohd Noor
Mamat, Abd Rasid
Mohd Satar, Siti Dhalila
Amri Abidin, Ahmad Faisal
Abdul Kadir, Mohd Fadzil
Addition chain heuristics in application to elliptic curve cryptosystems
author_facet Mohamed, Mohamad Afendee
Shawai, Yahaya Garba
Derahman, Mohd Noor
Mamat, Abd Rasid
Mohd Satar, Siti Dhalila
Amri Abidin, Ahmad Faisal
Abdul Kadir, Mohd Fadzil
author_sort Mohamed, Mohamad Afendee
title Addition chain heuristics in application to elliptic curve cryptosystems
title_short Addition chain heuristics in application to elliptic curve cryptosystems
title_full Addition chain heuristics in application to elliptic curve cryptosystems
title_fullStr Addition chain heuristics in application to elliptic curve cryptosystems
title_full_unstemmed Addition chain heuristics in application to elliptic curve cryptosystems
title_sort addition chain heuristics in application to elliptic curve cryptosystems
publisher Intelektual Pustaka Media Utama
publishDate 2024
url http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf
http://psasir.upm.edu.my/id/eprint/113090/
https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103
_version_ 1816132733357785088
score 13.214268