ebook img

political avenue language schools study menu PDF

332 Pages·2004·4.37 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview political avenue language schools study menu

Guide to Elliptic Curve Cryptography Darrel Hankerson Alfred Menezes Scott Vanstone Springer Guide to Elliptic Curve Cryptography Springer New York Berlin Heidelberg Hong Kong London Milan Paris Tokyo Darrel Hankerson Alfred Menezes Scott Vanstone Guide to Elliptic Curve Cryptography With 38 Illustrations Springer Darrel Hankcrsnn Alfred Menezes Department of Mathematics Departmet of Combinatories and Auburn University Optimization Auhuni, Al. .36849-5107. USA Univers i ty of Waterloo 1 hankedr" auburn, cdu Waterloo. Ontario, N2L 3G1 Canada @ ajmeneze uwaterloo.ca Scott Vanslone Depart menl of Combinatorics and Oplimi/.alion Universi ty of Waterloo Waterloo, Ontario. N2L 3Gl Canada 1 xavansUK" LI Waterloo.ea library of Congress Calaloging-in-Publication Data Hankerson. Darrel R. Guide to e l l ip t i c curve cryptography / Darrel Hankerson, Alfred J. Menezes, Scott Vanstone. p. cm. Includes bibliographical references and index. ISBN 0-387-95273-X ( a l k . paper) 1. Computer securiiy. 2. PuMic key cryptography. I. Vunsionc, Scott A, 11. Mene/.es. A. J. (Alfred J , ) , 1965- III. Title, QA76.9.A25H37 2003 005.8'(2-dc22 2003059137 ISBN 0-387-95273-X Printed un acid-free paper. (c) 2004 Springer-Verlag New York, Inc. 1 All riglils reserved. This work may not Ix translated or copied in wimle or in pan wi thou t the wri t ten permission ol ' I he puhlishi-r I Springer-VL-rlag New York, Inc., 175 I-'ifth Avenue, New York, NY 10010,USA J, except for brief excerpts in connection wi th reviews or scholarly analysis. Use in connection w i t h any form of information storage and reltrieval, electronic a d a p t i o n , computer software, or by similar or dissimilar methodology now known 01 hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whedier or not they are subject to proprietary r igh t s . Printed m the United States of America. ( H A M ) 987654321 SPIN 10832297 Springer-Vcrlag is a part of ' Springer science+Business Media springeronline.com Contents List of Algorithms ix List of Tables xiv List of Figures xvi Acronyms xvii Preface xix 1 Introduction and Overview 1 1.1 Cryptography basics . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Public-key cryptography . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2.1 RSA systems . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2.2 Discrete logarithm systems . . . . . . . . . . . . . . . . . . . 8 1.2.3 Elliptic curve systems . . . . . . . . . . . . . . . . . . . . . 11 1.3 Why elliptic curve cryptography? . . . . . . . . . . . . . . . . . . . . 15 1.4 Roadmap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 1.5 Notes and further references . . . . . . . . . . . . . . . . . . . . . . 21 2 Finite Field Arithmetic 25 2.1 Introduction to finite fields . . . . . . . . . . . . . . . . . . . . . . . 25 2.2 Prime field arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . 29 2.2.1 Addition and subtraction . . . . . . . . . . . . . . . . . . . . 30 2.2.2 Integer multiplication . . . . . . . . . . . . . . . . . . . . . . 31 2.2.3 Integer squaring . . . . . . . . . . . . . . . . . . . . . . . . 34 2.2.4 Reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 2.2.5 Inversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 2.2.6 NIST primes . . . . . . . . . . . . . . . . . . . . . . . . . . 44 vi Contents 2.3 Binary field arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . 47 2.3.1 Addition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 2.3.2 Multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . 48 2.3.3 Polynomial multiplication . . . . . . . . . . . . . . . . . . . 48 2.3.4 Polynomial squaring . . . . . . . . . . . . . . . . . . . . . . 52 2.3.5 Reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 2.3.6 Inversion and division . . . . . . . . . . . . . . . . . . . . . 57 2.4 Optimal extension field arithmetic . . . . . . . . . . . . . . . . . . . 62 2.4.1 Addition and subtraction . . . . . . . . . . . . . . . . . . . . 63 2.4.2 Multiplication and reduction . . . . . . . . . . . . . . . . . . 63 2.4.3 Inversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 2.5 Notes and further references . . . . . . . . . . . . . . . . . . . . . . 69 3 Elliptic Curve Arithmetic 75 3.1 Introduction to elliptic curves . . . . . . . . . . . . . . . . . . . . . . 76 3.1.1 Simplified Weierstrass equations . . . . . . . . . . . . . . . . 78 3.1.2 Group law . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 3.1.3 Group order . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 3.1.4 Group structure . . . . . . . . . . . . . . . . . . . . . . . . . 83 3.1.5 Isomorphism classes . . . . . . . . . . . . . . . . . . . . . . 84 3.2 Point representation and the group law . . . . . . . . . . . . . . . . . 86 3.2.1 Projective coordinates . . . . . . . . . . . . . . . . . . . . . 86 2 3 3.2.2 The elliptic curve y = x +ax +b . . . . . . . . . . . . . . 89 2 3 2 3.2.3 The elliptic curve y + xy = x +ax +b . . . . . . . . . . . 93 3.3 Point multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 3.3.1 Unknown point . . . . . . . . . . . . . . . . . . . . . . . . . 96 3.3.2 Fixed point . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 3.3.3 Multiple point multiplication . . . . . . . . . . . . . . . . . . 109 3.4 Koblitz curves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 3.4.1 The Frobenius map and the ring Z[τ ] . . . . . . . . . . . . . 114 3.4.2 Point multiplication . . . . . . . . . . . . . . . . . . . . . . . 119 3.5 Curves with efficiently computable endomorphisms . . . . . . . . . . 123 3.6 Point multiplication using halving . . . . . . . . . . . . . . . . . . . 129 3.6.1 Point halving . . . . . . . . . . . . . . . . . . . . . . . . . . 130 3.6.2 Performing point halving efficiently . . . . . . . . . . . . . . 132 3.6.3 Point multiplication . . . . . . . . . . . . . . . . . . . . . . . 137 3.7 Point multiplication costs . . . . . . . . . . . . . . . . . . . . . . . . 141 3.8 Notes and further references . . . . . . . . . . . . . . . . . . . . . . 147 Contents vii 4 Cryptographic Protocols 153 4.1 The elliptic curve discrete logarithm problem . . . . . . . . . . . . . 153 4.1.1 Pohlig-Hellman attack . . . . . . . . . . . . . . . . . . . . . 155 4.1.2 Pollard’s rho attack . . . . . . . . . . . . . . . . . . . . . . . 157 4.1.3 Index-calculus attacks . . . . . . . . . . . . . . . . . . . . . 165 4.1.4 Isomorphism attacks . . . . . . . . . . . . . . . . . . . . . . 168 4.1.5 Related problems . . . . . . . . . . . . . . . . . . . . . . . . 171 4.2 Domain parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 4.2.1 Domain parameter generation and validation . . . . . . . . . 173 4.2.2 Generating elliptic curves verifiably at random . . . . . . . . 175 4.2.3 Determining the number of points on an elliptic curve . . . . 179 4.3 Key pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 4.4 Signature schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 4.4.1 ECDSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 4.4.2 EC-KCDSA . . . . . . . . . . . . . . . . . . . . . . . . . . 186 4.5 Public-key encryption . . . . . . . . . . . . . . . . . . . . . . . . . . 188 4.5.1 ECIES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 4.5.2 PSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 4.6 Key establishment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 4.6.1 Station-to-station . . . . . . . . . . . . . . . . . . . . . . . . 193 4.6.2 ECMQV . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 4.7 Notes and further references . . . . . . . . . . . . . . . . . . . . . . 196 5 Implementation Issues 205 5.1 Software implementation . . . . . . . . . . . . . . . . . . . . . . . . 206 5.1.1 Integer arithmetic . . . . . . . . . . . . . . . . . . . . . . . . 206 5.1.2 Floating-point arithmetic . . . . . . . . . . . . . . . . . . . . 209 5.1.3 SIMD and field arithmetic . . . . . . . . . . . . . . . . . . . 213 5.1.4 Platform miscellany . . . . . . . . . . . . . . . . . . . . . . 215 5.1.5 Timings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 5.2 Hardware implementation . . . . . . . . . . . . . . . . . . . . . . . 224 5.2.1 Design criteria . . . . . . . . . . . . . . . . . . . . . . . . . 226 5.2.2 Field arithmetic processors . . . . . . . . . . . . . . . . . . . 229 5.3 Secure implementation . . . . . . . . . . . . . . . . . . . . . . . . . 238 5.3.1 Power analysis attacks . . . . . . . . . . . . . . . . . . . . . 239 5.3.2 Electromagnetic analysis attacks . . . . . . . . . . . . . . . . 244 5.3.3 Error message analysis . . . . . . . . . . . . . . . . . . . . . 244 5.3.4 Fault analysis attacks . . . . . . . . . . . . . . . . . . . . . . 248 5.3.5 Timing attacks . . . . . . . . . . . . . . . . . . . . . . . . . 250 5.4 Notes and further references . . . . . . . . . . . . . . . . . . . . . . 250 viii Contents A Sample Parameters 257 A.1 Irreducible polynomials . . . . . . . . . . . . . . . . . . . . . . . . . 257 A.2 Elliptic curves . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 A.2.1 Random elliptic curves over Fp . . . . . . . . . . . . . . . . 261 A.2.2 Random elliptic curves over F2m . . . . . . . . . . . . . . . . 263 A.2.3 Koblitz elliptic curves over F2m . . . . . . . . . . . . . . . . 263 B ECC Standards 267 C Software Tools 271 C.1 General-purpose tools . . . . . . . . . . . . . . . . . . . . . . . . . . 271 C.2 Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 Bibliography 277 Index 305 List of Algorithms 1.1 RSA key pair generation . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Basic RSA encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.3 Basic RSA decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Basic RSA signature generation . . . . . . . . . . . . . . . . . . . . . . 8 1.5 Basic RSA signature verification . . . . . . . . . . . . . . . . . . . . . . 8 1.6 DL domain parameter generation . . . . . . . . . . . . . . . . . . . . . . 9 1.7 DL key pair generation . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1.8 Basic ElGamal encryption . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.9 Basic ElGamal decryption . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.10 DSA signature generation . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.11 DSA signature verification . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.12 Elliptic curve key pair generation . . . . . . . . . . . . . . . . . . . . . . 14 1.13 Basic ElGamal elliptic curve encryption . . . . . . . . . . . . . . . . . . 14 1.14 Basic ElGamal elliptic curve decryption . . . . . . . . . . . . . . . . . . 14 2.5 Multiprecision addition . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.6 Multiprecision subtraction . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.7 Addition in Fp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.8 Subtraction in Fp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.9 Integer multiplication (operand scanning form) . . . . . . . . . . . . . . 31 2.10 Integer multiplication (product scanning form) . . . . . . . . . . . . . . . 32 2.13 Integer squaring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 2.14 Barrett reduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 2.17 Montgomery exponentiation (basic) . . . . . . . . . . . . . . . . . . . . 38 2.19 Extended Euclidean algorithm for integers . . . . . . . . . . . . . . . . . 40 2.20 Inversion in Fp using the extended Euclidean algorithm . . . . . . . . . . 40 2.21 Binary gcd algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 2.22 Binary algorithm for inversion in Fp . . . . . . . . . . . . . . . . . . . . 41 2.23 Partial Montgomery inversion in Fp . . . . . . . . . . . . . . . . . . . . 42

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.