Addition-Subtraction Chain for 160 bit Integers by using 2's Complement

Speeding up the scalar multiplication k.P is the major point in elliptic curve cryptosystem efficiency. The Addition-Subtraction (AS) Chain is efficient tool to do that where integer k is fixed and Point P is variable. Since the optimization problem to find the shortest AS Chain is NP-hard, many algorithms to get sub-optimal AS Chain in polynomial time are proposed. The window method is a class of theses algorithms. In this paper an algorithm for finding a shorter AS Chain is proposed. This algorithm is based on window method with small width by using 2’s Complement for 160 bit integers. It is shown practically that proposed algorithm more efficient than the last result in the subject with 20% improvement.

[1]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[2]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[3]  Yacov Yacobi,et al.  Exponentiating Faster with Addition Chains , 1991, EUROCRYPT.

[4]  J. Olivos,et al.  Speeding up the computations on an elliptic curve using addition-subtraction chains , 1990, RAIRO Theor. Informatics Appl..

[5]  Hirosuke Yamamoto,et al.  Window and Extended Window Methods for Addition Chain and Addition-Subtraction Chain , 1998 .

[6]  Tanja Lange,et al.  Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .

[7]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[8]  Donald E. Knuth The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .

[9]  C. Mitchell,et al.  Minimum weight modified signed-digit representations and fast exponentiation , 1989 .

[10]  Nadia Nedjah,et al.  Minimal Addition-Subtraction Chains Using Genetic Algorithms , 2002, ADVIS.

[11]  Nadia Nedjah,et al.  Minimal Addition-Subtraction Chains with Ant Colony , 2004, ICONIP.

[12]  Raveen R. Goundar,et al.  New Strategy for Doubling-Free Short Addition-Subtraction Chain , 2008 .

[13]  Chris J. Mitchell,et al.  Algorithms for software implementations of RSA , 1989 .

[14]  Daniel M. Gordon,et al.  A Survey of Fast Exponentiation Methods , 1998, J. Algorithms.

[15]  Matthijs J. Coster,et al.  Addition Chain Heuristics , 1989, CRYPTO.

[16]  Nicolas Meloni,et al.  New Point Addition Formulae for ECC Applications , 2007, WAIFI.

[17]  Yukio Tsuruoka,et al.  A Signed Binary Window Method for Fast Computing over Elliptic Curves (Special Section on Cryptography and Information Security) , 1993 .

[18]  N. Koblitz Elliptic curve cryptosystems , 1987 .