Addition chain heuristics in application to elliptic curve cryptosystems
The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Intelektual Pustaka Media Utama
2024
|
Online Access: | http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf http://psasir.upm.edu.my/id/eprint/113090/ https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.upm.eprints.113090 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.1130902024-11-15T09:08:14Z http://psasir.upm.edu.my/id/eprint/113090/ Addition chain heuristics in application to elliptic curve cryptosystems Mohamed, Mohamad Afendee Shawai, Yahaya Garba Derahman, Mohd Noor Mamat, Abd Rasid Mohd Satar, Siti Dhalila Amri Abidin, Ahmad Faisal Abdul Kadir, Mohd Fadzil The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind an optimal addition chain that includes the theoretical boundary for the upper limit and lower limit which laid the foundation for experimentation hereafter. In the following, we examine different addition chain solutions that were used to increase efficiency in scalar multiplication. To avoid any possible confusion, we intentionally separated the discussion into two modules called integer recoding method and chain generator based on the heuristics method. These methods were developed by considering various aspects such as the space within which the operation is executed, the curve that is selected, the formulation to express the original equation, and the choices of operation and arithmetic, all together to improve operational efficiency. Intelektual Pustaka Media Utama 2024 Article PeerReviewed text en cc_by_sa_4 http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf Mohamed, Mohamad Afendee and Shawai, Yahaya Garba and Derahman, Mohd Noor and Mamat, Abd Rasid and Mohd Satar, Siti Dhalila and Amri Abidin, Ahmad Faisal and Abdul Kadir, Mohd Fadzil (2024) Addition chain heuristics in application to elliptic curve cryptosystems. International Journal of Advances in Applied Sciences, 13 (3). pp. 546-555. ISSN 2252-8814; eISSN: 2722-2594 https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103 10.11591/ijaas.v13.i3.pp546-555 |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English |
description |
The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind an optimal addition chain that includes the theoretical boundary for the upper limit and lower limit which laid the foundation for experimentation hereafter. In the following, we examine different addition chain solutions that were used to increase efficiency in scalar multiplication. To avoid any possible confusion, we intentionally separated the discussion into two modules called integer recoding method and chain generator based on the heuristics method. These methods were developed by considering various aspects such as the space within which the operation is executed, the curve that is selected, the formulation to express the original equation, and the choices of operation and arithmetic, all together to improve operational efficiency. |
format |
Article |
author |
Mohamed, Mohamad Afendee Shawai, Yahaya Garba Derahman, Mohd Noor Mamat, Abd Rasid Mohd Satar, Siti Dhalila Amri Abidin, Ahmad Faisal Abdul Kadir, Mohd Fadzil |
spellingShingle |
Mohamed, Mohamad Afendee Shawai, Yahaya Garba Derahman, Mohd Noor Mamat, Abd Rasid Mohd Satar, Siti Dhalila Amri Abidin, Ahmad Faisal Abdul Kadir, Mohd Fadzil Addition chain heuristics in application to elliptic curve cryptosystems |
author_facet |
Mohamed, Mohamad Afendee Shawai, Yahaya Garba Derahman, Mohd Noor Mamat, Abd Rasid Mohd Satar, Siti Dhalila Amri Abidin, Ahmad Faisal Abdul Kadir, Mohd Fadzil |
author_sort |
Mohamed, Mohamad Afendee |
title |
Addition chain heuristics in application to elliptic curve cryptosystems |
title_short |
Addition chain heuristics in application to elliptic curve cryptosystems |
title_full |
Addition chain heuristics in application to elliptic curve cryptosystems |
title_fullStr |
Addition chain heuristics in application to elliptic curve cryptosystems |
title_full_unstemmed |
Addition chain heuristics in application to elliptic curve cryptosystems |
title_sort |
addition chain heuristics in application to elliptic curve cryptosystems |
publisher |
Intelektual Pustaka Media Utama |
publishDate |
2024 |
url |
http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf http://psasir.upm.edu.my/id/eprint/113090/ https://ijaas.iaescore.com/index.php/IJAAS/article/view/21103 |
_version_ |
1816132733357785088 |
score |
13.214268 |