CRC-Based Error Detection Constructions for FLT and ITA Finite Field Inversions Over GF(2m)

Binary extension finite fields <inline-formula> <tex-math notation="LaTeX">${\mathrm{ GF}}(2^{m})$ </tex-math></inline-formula> have received prominent attention in the literature due to their application in many modern public-key cryptosystems and error-correcting codes. In particular, the inversion over <inline-formula> <tex-math notation="LaTeX">${\mathrm{ GF}}(2^{m})$ </tex-math></inline-formula> is crucial for current and postquantum cryptographic applications. Schemes such as Fermat’s little theorem (FLT) and the Itoh–Tsujii algorithm (ITA) have been studied to achieve better performance; however, this arithmetic operation is a complex, expensive, and time-consuming task that may require thousands of gates, increasing its vulnerability chance to natural defects. In this work, we propose efficient hardware architectures based on cyclic redundancy check (CRC) as error detection schemes for state-of-the-art finite field inversion over <inline-formula> <tex-math notation="LaTeX">${\mathrm{ GF}}(2^{m})$ </tex-math></inline-formula> for a polynomial basis. To verify the derivations of the formulations, software implementations are performed. Likewise, hardware implementations of the original finite field inversions with the proposed error detection schemes are performed over Xilinx field-programmable gate array (FPGA) verifying that the proposed schemes achieve high error coverage with acceptable overhead.

[1]  Alfred Menezes,et al.  NIST Elliptic Curves , 2011, Encyclopedia of Cryptography and Security.

[2]  Srinivas Vivek,et al.  Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures , 2014, Journal of Cryptographic Engineering.

[3]  Burton S. Kaliski,et al.  The Montgomery Inverse and Its Applications , 1995, IEEE Trans. Computers.

[4]  ItohToshiya,et al.  A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases , 1988 .

[5]  M. Anwar Hasan,et al.  Error Detection in Polynomial Basis Multipliers over Binary Extension Fields , 2002, CHES.

[6]  Francisco Rodríguez-Henríquez,et al.  A fast implementation of multiplicative inversion over GF(2/sup m/) , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[7]  Arash Reyhani-Masoleh,et al.  Reliable Hardware Architectures for the Third-Round SHA-3 Finalist Grostl Benchmarked on FPGA Platform , 2011, 2011 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems.

[8]  Reza Azarderakhsh,et al.  Reliable hash trees for post-quantum stateless cryptographic hash-based signatures , 2015, 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS).

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Christof Paar,et al.  Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes , 2002, Des. Codes Cryptogr..

[11]  Reza Azarderakhsh,et al.  Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.