Next Article in Journal
A Novel Target Tracking Scheme Based on Attention Mechanism in Complex Scenes
Next Article in Special Issue
Blockchain-Enabled Decentralized Secure Big Data of Remote Sensing
Previous Article in Journal
Intelligent Vehicle Trajectory Tracking Control Based on VFF-RLS Road Friction Coefficient Estimation
Previous Article in Special Issue
A DDoS Vulnerability Analysis System against Distributed SDN Controllers in a Cloud Computing Environment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Elliptic Curve Operators for Jacobian Coordinates

1
Department of Computer Engineering, Umm Al-Qura University, Mecca 21955, Saudi Arabia
2
Department of Computer Engineering and Sciences, Florida Institute of Technology, Melbourne, FL 32901, USA
*
Author to whom correspondence should be addressed.
Much of the work was performed when Wesam Eid was located at the Florida Institute of Technology.
Electronics 2022, 11(19), 3123; https://doi.org/10.3390/electronics11193123
Submission received: 18 August 2022 / Revised: 18 September 2022 / Accepted: 23 September 2022 / Published: 29 September 2022
(This article belongs to the Special Issue Intelligent Data Sensing, Processing, Mining, and Communication)

Abstract

:
The speed up of group operations on elliptic curves is proposed using a new type of projective coordinate representation. These operations are the most common computations in key exchange and encryption for both current and postquantum technology. The boost this improvement brings to computational efficiency impacts not only encryption efforts but also attacks. For maintaining security, the community needs to take note of this development as it may need to operate changes in the key size of various algorithms. Our proposed projective representation can be viewed as a warp on the Jacobian projective coordinates, or as a new operation replacing the addition in a Jacobian projective representation, basically yielding a new group with the same algebra elements and homomorphic to it. Efficient algorithms are introduced for computing the expression P k + Q where P and Q are points on the curve and k is an integer. They exploit optimized versions for particular k values. Measurements of the numbers of basic computer instructions needed for operations based on the new representation show clear improvements. The experiments are based on benchmarks selected using standard NIST elliptic curves.

1. Introduction

Secure Internet-based communications rely on public-key cryptography, which allows entities to communicate without the need for sharing confidential material in advance. Elliptic curve cryptography (ECC), proposed in 1985, is still a predominant type of public-key cryptography [1]. ECC is commonly used for encrypted emails, online banking, secure e-commerce websites, digital signatures, and other data transfer applications where the size of the storage space for public keys is an issue. Breaching these applications would have significant effects on society. The adoption of ECC has been accelerated by recommendations from an array of standardization entities, including NIST, IETF, and ANSI (NIST, 2016). Compared to competitors like RSA and Elgamal, elliptic curve cryptography introduced some of the most efficient public key cryptosystems (PKC) for desirable security. While there are known quantum and classical attacks that breach cryptographic protocols based on supersingular isogeny graphs (SIGs), the supersingular isogeny Diffie–Hellman (SIDH) technique is based on elliptic curves and has no known quantum-based attacks [2].
Quantum computer developments menace to break classic elliptic curve and factoring techniques for public-key cryptography. Supersingular isogeny Diffie–Hellman (SIDH) key exchange is one of the postquantum cryptographic algorithms that can offer secure key exchanges between communicating entities over insecure communication channels [3,4]. The core operations for SIDH are the computation of the isogeny and of its kernel. Basically, Velu’s formula is used to compute the isogeny, and the P + k [ Q ] formula is used to compute the kernel, where P and Q are points on the curve and k is the secret key that is generated by both parties [5]. The complexity of SIDH relies on the difficulty of finding isogenies other than computing the scalar multiplication in the kernel formula. Thus, speeding up elliptic curve (EC) computations will not only benefit the applications that rely on ECC, but also has an effective impact on the postquantum cryptosystem SIDH. Moreover, attacks are not necessarily limited to independent calculations and might also be based on analyzing hardware behaviors such as with the side-channel attack (SCA). As attackers analyze electrical power consumption patterns, which differ between performing point addition or point doubling, they can recover the secret key. Therefore, the development criteria for EC algorithms and systems can include aspects other than speed. For instance, the addition in the Montgomery coordinate system [6] is resistant to such attacks, being similar to doubling. A drawback of the Montgomery coordinate system is that it is slower than other coordinate systems such as projective and Jacobian [7].
Here, we provide effective algorithms supporting improvements to EC systems in several ways, both in terms of speed-up and resistance to side-channel attacks.
Unlike with other coordinate systems, the original affine operations with the Weierstrass elliptic curve form [7] require computing an inverse each time we perform point doubling or addition, i.e., at every iteration of common fast EC scalar multiplication algorithms. In general, finding inverses is much slower than big integer multiplication. Thus, as commonly done with projective approaches, a main goal of our work is to eliminate inverses. Our first contribution is to compensate the previous abscissa x and ordinate y equations in the higher doubling orders formulas and find a better common factor between all slope’s denominators in order to result in a single inverse for each algorithm. In addition, we apply a term regrouping step (referred to as labeling) to minimize the number of multiplications. By using these methods, we contribute an efficient way to compute higher doubling orders with an algorithm involving a single inverse. Moreover, we follow the same steps to find intermediate scalar multiplication algorithms, multiplying an EC point P with scalars up to  34 P .
We contribute a new coordinate system using only x and y coordinates and performing a single inverse along the secret key size. The new coordinate system is shown to have competitive properties when compared with other coordinate systems. It can also be seen as a set of new and efficient operators in the Jacobian coordinate space, or on a warped version thereof. Subsequently, we introduce two different competing general scalar EC multiplication algorithms and compare between them using multiple coordinate systems illustrating the strengths of the new proposal.

2. Background

The most popular forms of public-key cryptography for current applications have increasingly been based on elliptic curves (ECs) [8,9]. With elliptic curve cryptography (ECC), messages and secrets are mapped to points on an elliptic curve, and specific point-doubling and point-addition operations define transitions between points. Scalar point multiplication uses such a sequence of point-doubling and point-addition operations to optimize repeated addition:
Q = [ k ] P = P + P + + P k .
Cryptosystems based on ECs rely on the difficulty of solving the elliptic curve discrete log (ECDL) problem. Namely, for elliptic curves with points P of large order and large k numbers, given the points Q and P in the previous equation, it is hard to determine the scalar multiple k. However, with the expected emergence of quantum computers [10], in the near future, cryptosystems whose security relies on the difficulty of ECDL will no longer be safe, since the scalar multiple may be easily recovered using Shor’s algorithm [11]. Other quantum resilient schemes have been proposed. Furthermore, postquantum cryptosystems such as supersingular isogeny Diffie–Hellman (SIDH) are slow techniques, and speeding up their elliptic curve computation is a significant goal.
The core operation for ECC is the scalar multiplication [ k ] P whose computation speed is seen as key to improving ciphers. For instant, in [12] Eisentrager et al. proposed a method for computing the formula  S = ( 2 P + Q ) . Their improved procedure saved a field multiplication, when compared to the original algorithm. Later, Ciet et al. [13] introduced a faster method for computing the same formula when a field inversion costs more than six field multiplications. Furthermore, they introduced an efficient method for computing point tripling. A mixed-powers system of point doubling and tripling for computing the scalar multiplication was represented later by Dimitrov et al. [14]. In [15], Mishra et al. presented an efficient quintuple formula ( 5 P ) and introduced a mixed-base algorithm with doubling and tripling. A further development was introduced by Longa and Miri [16] by computing an efficient method for tripling and quintupling mixed with a differential addition. They proposed an efficient multibase nonadjacent representation (mbNAF) to reduce the cost. In [16], the same authors presented a further optimization in terms of cost for computing the form  d P + Q . They succeeded in implementing the previous forms of mixed double-and-add algorithm by using a single inversion when applying a new precomputation scheme. More recently, Purohit and Rawat [17] used a multibase representation to propose an efficient scalar multiplication algorithm of doubling, tripling, and septupling, restricted on a non supersingular elliptic curve defined over the field  F 2 m . In addition, they compared their work with other existing algorithms to achieve a better representation in terms of cost. Therefore, speeding up the scalar multiplication computation in parallel with reducing the cost is a critical task. We present a new methodology to compute elliptic curve operations with more general forms of the type m P + n Q , where m and n are small integers, aiming for a faster implementation with the lowest cost among currently known algorithms using only one inversion.
Among all applications based on EC, the highest benefit from our work concerns the postquantum cryptosystem, supersingular isogeny Diffie–Helman (SIDH). Its main weakness is the slow elliptic curve computation speed. For elliptic curve schemes, the computation speed-up also favors attacks, which can however be compensated by increasing the size of the key. Isogeny-based cryptography also utilizes points on an elliptic curve, but its security is instead based on the difficulty of computing isogenies between elliptic curves. An isogeny can be thought of as a unique algebraic mapping between two elliptic curves that satisfy the group law. An algorithm for computing isogenies on ordinary curves in subexponential time was presented by Childs et al. [18], rendering the use of cryptosystems based on isogenies on ordinary curves unsafe in the presence of quantum computers. However, there is no known algorithm for computing isogenies on supersingular curves in subexponential time.
The core operations for SIDH is computing the isogeny using Velu’s formula, and its kernel using the P + k [ Q ] formula, where P and Q are points on the curve and k is the secret key [5]. This operation must be performed in both phases of SIDH. First, this happens in the key generation phase, where the point is known in advance. In this case, one can construct a lookup table that contains all doubles of point Q and reuse any of them when it is needed. Second, in the key exchange phase, where the point Q is variable, we can apply our mixed-base representation (up to 32) in order to speed up the calculations, given that all mixed-base formulas are implemented with a single inversion.
According to Gutub, there are various ways to apply elliptic curves in applications of cryptography [19]. He studied how the algorithm utilized for calculating n P from P was based on the binary representation of n, in efficient and practical hardware implementations [19]. That is, the binary algorithm scanned the bits of n and doubled the point Q for a number of k-times [19]. Gutub further highlighted how the extra operation of point addition ( Q + P ) was essential, being performed in every case that a particular bit of n was found [19].

2.1. Weierstrass Elliptic Curve

This section represents the equations of the original work that we compare our algorithm with. We consider elliptic curves over Z p , where p > 3 . Such a curve, in the short Weierstrass form in the affine plan, is the set of all pairs ( x , y ) Z p which fulfill:
y 2 x 3 + a · x + b ( m o d p )
For P = ( x P , y P ) and Q = ( x Q , y Q ) , one can compute P + Q by using the following equations, where the computation of λ differs based on two disjoint cases [20].
In the case of an addition where P Q :
λ = y Q y P x Q x P m o d p
x R = λ 2 x P x Q m o d p
In the case of computing 2 P (doubling of order one) where P has coordinates ( x 1 , y 1 ):
λ = 3 x 1 2 + a 2 y 1 m o d p
x 2 = λ 2 2 x 1 m o d p
y 2 = λ x 1 x 2 y 1 m o d p
where λ is the slope of the tangent through P, and  x 2 and y 2 are the affine coordinates after doubling P one time. While a two-dimensional projective space can also be used for computations in the Weierstrass form, here, we focus on computations in the affine plan.

2.2. Projective

Projective coordinates are another way of representing an elliptic curve. The elliptic curve Γ can be described by another equation, in the projective space P 2 . That is, the polynomial defines a curve in the projective space P 2 , which is also known as a Weierstrass Equation [21]:
Γ : Y 2 Z + a 1 X Y Z + a 3 Y Z 2 = X 3 + a 2 X 2 Z + a 4 X Z 2 + a 6 Z 3
According to Smart [21], a definition of a projective n-dimensional space P n over a field F is:
  • the set of ( n + 1 ) t u p l e s ( x 0 , , x n ) F n + 1
  • where at least one x i per tuple does not equal 0, and;
  • where an equivalence relation between two tuples ( x 0 , 1 , , x n , 1 ) and ( x 0 , 2 , , x n , 2 ) in P n holds if U F such that i , x i , 1 = U x i , 2 .
We note that a more general definition would replace the third condition with: i , x i , 1 = g i ( U ) x i , 2 for some bijective function g i .
The equivalence class of { U ( x 0 , , x n ) , U F } is denoted by [ x 0 , , x n ] , where these x 0 , , x n are known as the homogeneous coordinates of that point [21]. Projective coordinates are useful in cases where there is a need to eradicate the performance of costly inversion operations [19].
Higuchi and Takagi [22] and Okeya et al. [23] noted how randomized projective coordinates on a Montgomery-form elliptic curve are effective in securing systems against side-channel attacks. For example, Okeya et al. [23] recommended a scalar multiplication method that does not incur a higher computational cost for randomized projective coordinates of the Montgomery form of elliptic curves.
Homogeneous projective coordinates correspond to the two-dimensional space through the substitution x = X / Z and y = Y / Z , so that the general Weierstrass form equates to:
E : Y 2 Z + a 1 X Y Z + a 3 Y Z 2 = X 3 + a 2 X 2 Z + a 4 X Z 2 + a 6 Z 3 .
Jacobian projective coordinates [24,25,26] are obtained by substituting x = X / Z 2 and y = Y / Z 3 , so that the general Weierstrass form equates to:
E : Y 2 + a 1 X Y Z + a 3 Y Z 3 = X 3 + a 2 X 2 Z 2 + a 4 X Z 4 + a 6 Z 6 .
With the use of a projective coordinates approach, the attacker is unable to predict the appearance of a specific value when the projective coordinates are randomized [22,23].
Specifically, Higuchi and Takagi [22] proposed a fast addition algorithm on an elliptic curve over GF( 2 n ) using projective coordinates:
x = X / Z y = Y / Z 2
According to Higuchi and Takagi [22], the above projective coordinates have less multiplications than the previously known fastest algorithm [27].

3. Affine Recomputation of Multistage Doubling

When computing a scalar multiplication of elliptic curve points P using fast algorithms inspired from Horner’s rule, it is common to need operations of the type k P , that we refer here as the kth-order double of P.
In this section, we illustrate how to find a higher-order double independently, without going through all the steps that are required for the original affine coordinates algorithm.
We refer to 2 k P as the kth double of P, and to k P as the kth-order double of P. We denote by N x k and N y k the numerators of the x and y coordinates of the kth-order double ( k P ), which are denoted x k and y k , respectively. Namely, we rewrite x k = N x k U k 2 and y k = N y k U k 3 , where k is the order of the desired double, and  U k denotes the corresponding added projective parameter.
When we compute 4 P , first we find N x 2 and N y 2 as the numerators of x 2 and y 2 , the x and y coordinates of the first double ( 2 P ), respectively.
For this, substitute the value of λ in Equation (3) in both equations of x and y coordinates, then multiply the transformed Equations (4) and (5) with ( 2 y 1 ) 2 , for denominators with U 2 = 2 y 1 . The obtained N x 2 and N y 2 expressions are,
N x 2 = 3 x 1 2 + a 2 2 x 1 2 y 1 2 m o d p
N y 2 = 3 x 1 2 + a x 1 2 y 1 2 N x 2 2 y 1 2 2 y 1 2 m o d p
We replace the variables x 2 and y 2 in the second double slope, getting:
λ 4 = 3 x 2 2 + a 2 y 2 m o d p
λ 4 = 3 N x 2 U 2 2 2 + a 2 N y 2 U 2 3 m o d p
Note that U 2 is the denominator of the ( 2 P ) slope λ 2 = λ . Now, we eliminate the inverses by amplifying the fraction of λ 4 with U 2 4 U 2 4 ,
λ 4 = 3 N x 2 2 + a U 2 4 2 N y 2 U 2 m o d p
For simplicity, we consider,
W 4 = 3 N x 2 2 + a U 2 4 m o d p
q 4 = 2 N y 2 m o d p
The new denominator of the obtained slope λ 4 is:
U 4 = q 4 U 2 m o d p
Then, we substitute the new slope equation in the x 4 and y 4 equations,
x 4 = λ 4 2 2 x 2 m o d p
x 4 = W 4 U 4 2 2 N x 2 U 2 2 m o d p
Eliminating the inverses in the x 4 equation by bringing to a common denominator and amplifying the obtained fraction with the value of U 4 2 where we recall from Equation (10) that,
U 4 = 2 y 1 q 4
We get,
U 4 2 x 4 = W 4 2 2 N x 2 q 4 2 m o d p
x 4 = W 4 2 2 N x 2 q 4 2 U 4 2 m o d p
where to match
x 4 = N x 4 U 4 2 m o d p
We obtain:
N x 4 = W 4 2 2 N x 2 q 4 2
The same steps are applied in order to find and simplify y 4
y 4 = λ 4 x 2 x 4 y 2 m o d p
y 4 = W 4 U 4 N x 2 U 2 2 N x 4 U 4 2 N y 2 U 2 3 m o d p
Then, we amplify y 4 by U 4 3
U 4 3 y 4 = W 4 N x 2 q 4 2 N x 4 N y 2 q 4 3 m o d p
y 4 = W 4 N x 2 q 4 2 N x 4 N y 2 q 4 3 U 4 3 m o d p
where to match
y 4 = N y 4 U 4 3 m o d p
we obtain
N y 4 = W 4 N x 2 q 4 2 N x 4 N y 2 q 4 3
Furthermore, these equations can be generalized for any doubling order. By using this form, one can compute N x n and N y n and then replace all the variables in the equation that are related to the order of the desired double in order to perform any advanced double directly (direct doubling). Computing the previous W n ’s, U n ’s, N x n ’s, and N y n ’s is required but having the N x n and N y n formulas, the computations can be done smoothly.
Here is the general form that performs any doubling:
W n = 3 N x n / 2 2 + a U n / 2 4 m o d p
q n = 2 N y n / 2 m o d p
U n = q n U n / 2 m o d p
x n = W n 2 2 N x n / 2 q n 2 U n 2 m o d p
x n = N x n U n 2 m o d p
N x n = W n 2 2 N x n / 2 q n 2
y n = W n N x n / 2 q n 2 N x n N y n / 2 q n 3 U n 3 m o d p
y n = N y n U n 3 m o d p
N y n = W n N x n / 2 q n 2 N x n N y n / 2 q n 3
where n is the order of the double and n / 2 is assigned to the previous power of 2 double.

Numerical Examples

In this section, we use the cyclic group of points on the next elliptic curve E, where the order of E is 19 [20]:
E : y 2 x 3 + 2 · x + 2 m o d 17
It is described by the following equations [20]:
2 P = ( 5 , 1 ) + ( 5 , 1 ) = ( 6 , 3 ) 3 P = 2 P + P = ( 10 , 6 ) 4 P = ( 3 , 1 ) 5 P = ( 9 , 16 ) 6 P = ( 16 , 13 ) 7 P = ( 0 , 6 ) 8 P = ( 13 , 7 ) 9 P = ( 7 , 6 ) 10 P = ( 7 , 11 ) 11 P = ( 13 , 10 ) 12 P = ( 0 , 11 ) 13 P = ( 16 , 4 ) 14 P = ( 9 , 1 ) 15 P = ( 3 , 16 ) 16 P = ( 10 , 11 ) 17 P = ( 6 , 14 ) 18 P = ( 5 , 16 ) 19 P = O
As we see, it goes from the primitive element P = (5,1) to 19P, which represents the identity element, then flips to P again as it is the characteristic of any cyclic group. We use this curve in all our numerical example sections at the end of each algorithm.
Let P = (5,1) to exemplify our direct doubling algorithm. First, we compute N x 1 and N y 1 that are related to the point 2P = (6,3), then we apply another four iterations in order to compute the point 32P mod 17 that is equivalent to the point 13P = (16,4).
N x 2 = ( 3 x 1 2 + a ) 2 2 x 1 ( 2 y 1 ) 2 m o d p
N x 2 = ( 3 ( 5 ) 2 + 2 ) 2 2 ( 5 ) ( 2 ( 1 ) ) 2 m o d 17
N x 2 = 13 6 m o d 17
N x 2 = 7
N y 2 = ( 3 x 1 2 + a ) ( x 1 ( 2 y 1 ) 2 N x 2 ) 2 y 1 2 ( 2 y 1 ) 2 m o d p
N y 2 = ( 3 ( 5 ) 2 + 2 ) ( ( 5 ) ( 2 ( 1 ) ) 2 7 ) 2 ( 1 ) 2 ( 2 ( 1 ) ) 2 m o d 17
N y 2 = 9 ( 3 7 ) 8 m o d 17
N y 2 = 7
where U 2 = 2 y 1 = 2.
Now, we start the first iteration to find the variables N x 4 , N y 4 , W 4 , q 4 , and U 4 that are related to the point 4P.
W 4 = 3 N x 2 2 + a U 2 4 m o d p
W 4 = 3 ( 7 ) 2 + 2 ( 2 ) 4 m o d 17
W 4 = 9
q 4 = 2 N y 2 m o d p
q 4 = 2 ( 7 ) m o d 17
q 4 = 14
U 4 = q 4 U 2 m o d p
U 4 = 14 ( 2 ) m o d 17
U 4 = 11
Then, we substitute these values in the x 4 and y 4 equations, and we get,
x 4 = W 4 2 2 N x 2 q 4 2 U 4 2 m o d p
x 4 = 9 2 2 ( 7 ) ( 14 ) 2 2 m o d 17
x 4 = 6 2 m o d 17
x 4 = 3
where the inverse of two is nine and N x 4 = 6.
y 4 = W 4 ( N x 2 q 4 2 N x 4 ) N y 2 q 4 3 U 4 3 m o d p
y 4 = 9 ( 7 ( 14 ) 2 6 ) 7 ( 14 ) 3 11 3 m o d 17
y 4 = 5 5 m o d 17
y 4 = 1
where the inverse of five is seven and N y 4 = 5.
Now, the inputs for the next iteration are ready in order to compute the point 8P.
W 8 = 3 N x 4 2 + a U 4 4 m o d p
W 8 = 3 ( 6 ) 2 + 2 ( 11 ) 4 m o d 17
W 8 = 14
q 8 = 2 N y 4 m o d p
q 8 = 2 ( 5 ) m o d 17
q 8 = 10
U 8 = q 8 U 4 m o d p
U 8 = 10 ( 11 ) m o d 17
U 8 = 8
Then, we substitute these values in the x 8 and y 8 equations, and we get,
x 8 = W 8 2 2 N x 4 q 8 2 U 8 2 m o d p
x 8 = 14 2 2 ( 6 ) ( 10 ) 2 8 2 m o d 17
x 8 = 16 13 m o d 17
x 8 = 13
where the inverse of 13 is 4 and N x 8 = 16.
y 8 = W 8 ( N x 4 q 8 2 N x 8 ) N y 4 q 8 3 U 8 3 m o d p
y 8 = 14 ( 6 ( 10 ) 2 16 ) 5 ( 10 ) 3 8 3 m o d 17
y 8 = 14 2 m o d 17
y 8 = 7
where the inverse of two is nine and N y 8 = 14.
Now, we substitute with the new values of N x , N y , and U in the next iteration equations in order to compute the point 16P.
W 16 = 3 N x 8 2 + a U 8 4 m o d p
W 16 = 3 ( 16 ) 2 + 2 ( 8 ) 4 m o d 17
W 16 = 1
q 16 = 2 N y 8 m o d p
q 16 = 2 ( 14 ) m o d 17
q 16 = 11
U 16 = q 16 U 8 m o d p
U 16 = 11 ( 8 ) m o d 17
U 16 = 3
Then, we substitute these values in the x 16 and y 16 equations, and we get,
x 16 = W 16 2 2 N x 8 q 16 2 U 16 2 m o d p
x 16 = 1 2 2 ( 16 ) ( 11 ) 2 3 2 m o d 17
x 16 = 5 9 m o d 17
x 16 = 10
The inverse of nine is two and N x 16 = 5.
y 16 = W 16 ( N x 8 q 16 2 N x 16 ) N y 8 q 16 3 U 16 3 m o d p
y 16 = 1 ( 16 ( 11 ) 2 5 ) 14 ( 11 ) 3 3 3 m o d 17
y 16 = 8 10 m o d 17
y 16 = 11
The inverse of 10 is 12 and N y 16 = 8.
Now, we substitute with the new values of N x , N y , and U in the last iteration equations in order to compute the desired point 32P.
W 32 = 3 N x 16 2 + a U 16 4 m o d p
W 32 = 3 ( 5 ) 2 + 2 ( 3 ) 4 m o d 17
W 32 = 16
q 32 = 2 N y 16 m o d p
q 32 = 2 ( 8 ) m o d 17
q 32 = 16
U 32 = q 32 U 16 m o d p
U 32 = 16 ( 3 ) m o d 17
U 32 = 14
Then, we substitute these values in the x 32 and y 32 equations, and we get,
x 32 = W 32 2 2 N x 16 q 32 2 U 32 2 m o d p
x 32 = ( 16 ) 2 2 ( 5 ) ( 16 ) 2 ( 14 ) 2 m o d 17
x 32 = 8 9 m o d 17
x 32 = 16
where the inverse of nine is two and N x 32 = 8. Further,
y 32 = W 32 ( N x 16 q 32 2 N x 32 ) N y 16 q 32 3 U 32 3 m o d p
y 32 = 16 ( 5 ( 16 ) 2 8 ) 8 ( 16 ) 3 ( 14 ) 3 m o d 17
y 32 = 11 7 m o d 17
y 32 = 4
where the inverse of seven is five and N y 32 = 11.

4. Intermediate Operations

As it is important to calculate the binary multiplicative 2 n for points Q to compute a large degree isogeny, we enhance the algorithm by finding the intermediate steps such as 3P, 5P, 7P, etc.
In [28], Subramanya Rao worked on Montgomery curves and found an efficient technique to find point tripling. Simply, we optimize an application of a single double to some point P, then perform a point addition. This technique could be applied to all intermediate steps. We present a set of general forms through which we represent the interstitial points up to 31P.

4.1. Fast 2 n Q + P

As mentioned earlier in the background section, the complexity of the SIDH cryptosystem relies on computing isogenies between points on the elliptic curve. Thus, we performed a further optimization in term of the kernel equation  P + [ k ] Q . As we succeeded to perform an advanced exponent of a point on a curve with a single inverse, it would have required an extra inverse for a differential point addition. Therefore, in this section, we introduce an optimization for mixing our advanced doubling equations with the addition and perform it with a single inverse.
The following equations have some variables such as N x , N y , and U that have to be replaced with the variables related to each double.
We substitute the value of th x and y coordinates of the point 2 n P in Equations (18) and (21), respectively, in the addition slope equation in (2).
λ n = N y n U n 3 y 1 N x n U n 2 x 1 m o d p
Multiplying with U n 3 to eliminate the inverses,
λ n + m = N y n y 1 U n 3 N x n U n x 1 U n 3 m o d p
W n + m = N y n y 1 U n 3 m o d p
q n + m = N x n x 1 U n 2 m o d p
U n + m = U n q n + m m o d p
Substituting λ n + m in the equations for x n + m and y n + m ,
x n + m = ( W n + m U n + m ) 2 x 1 N x n U n 2 m o d p
Multiplying with U n + m 2 ,
x n + m = W n + m 2 x 1 U n + m 2 N x n q n + m 2 U n + m 2 m o d p
x n + m = N x n + m U n + m 2 m o d p
Now, we find y n + m ,
y n + m = W n + m U n + m ( x 1 N x n + m U n + m 2 ) y 1 m o d p
Multiplying with U n + m 3 ,
y n + m = W n + m ( x 1 U n + m 2 N x n + m ) y 1 U n + m 3 U n + m 3 m o d p
y n + m = N y n + m U n + m 3 m o d p

Numerical Examples

Let P = (5,1), then we apply our 2 n P + P algorithm to compute the new x and y coordinates. In this example, we apply 2 2 P + P in order to find the point 5P. We consider the values previously computed in the numerical example of Section 3 for the point 4P where
N x 4 = 6
N y 4 = 5
U 4 = 11
We substitute these values in Equations (28) and (29) and we get,
W 5 = N y 4 y 1 U 4 3 m o d p
W 5 = 5 1 ( 11 ) 3 m o d 17
W 5 = 0
q 5 = N x 4 x 1 U 4 2 m o d p
q 5 = 6 5 ( 11 ) 2 m o d 17
q 5 = 13
U 5 = U 4 q 5 m o d p
U 5 = 11 ( 13 ) m o d 17
U 5 = 7
x 5 = W 5 2 x 1 U 5 2 N x 4 q 5 2 U 5 2 m o d p
x 5 = ( 0 ) 2 5 ( 7 ) 2 6 ( 13 ) 2 ( 7 ) 2 m o d 17
x 5 = 16 15 m o d 17
x 5 = 9
where the inverse of 15 is 8 and N x 5 = 16.
y 5 = W 5 ( x 1 U 5 2 N x 5 ) y 1 U 5 3 U 5 3 m o d p
y 5 = 0 ( 5 ( 7 ) 2 16 ) 1 ( 7 ) 3 ( 7 ) 3 m o d p
y 5 = 14 3 m o d 17
y 5 = 16
where the inverse of three is six and N y 5 = 14.

4.2. Another General Forms

In Section 4.1, we illustrated the importance of computing the intermediate equations for the overall speed-up of our algorithms. Table 1 lists our general forms that we illustrated to implement all the points up to 31P.
As it is known, the nonadjacent form (NAF) aims to reduce the number of one bit in the binary representation and thus reduce the number of operations; here, we likewise present in Table 2 the mathematical structure that we relied on for representing all points up to 31P with the fastest and most efficient possible form.

5. Extraction of Coordinates (EiSi Coordinates)

The EiSi coordinate system can be seen as a modified version of either the affine or Jacobian spaces with different operators. Each point  P A = ( N x A : N y A : U A ) is represented in affine coordinates as ( N x A / U A 2 , N y A / U A 3 ) . The EiSi space operators also offer faster arithmetic. Similar to the previous projective techniques, this form of elliptic curve is represented with a single inversion at the last iteration.
Let P A and P B be points on an elliptic curve then, in affine space,
( X A : Y A ) + ( X B : Y B ) = ( X C : Y C )
At the first iteration, we consider U A = U B = 1, then we get,
( N x A : N y A ) + ( N x B : N y B ) = N x c U c 2 : N y c U c 3
where (in case of doubling),
N x C = 3 x A 2 + a 2 2 x A 2 y A 2 m o d p
N y C = 3 x A 2 + a x A 2 y A 2 N x A 2 y A 2 2 y A 2 m o d p
U c = 2 y A m o d p
Additionally, in case of adding two points after the first iteration, where the base point will be changed, we illustrate a modified version of the point addition algorithm. Let P A and P B be a point on the elliptic curve where ( N x A : N y A : U A ) and ( N x B : N y B : U B ) are the projective EiSi points representation, respectively. Then, we get,
( N x A : N y A : U A ) + ( N x B : N y B : U B ) = ( N x C : N y C : U C )
In the case P 1  ≠  ± P 2 (addition),
W C = N y B U A 3 N y A U B 3 m o d p
q C = N x B U A 2 N x A U B 2 m o d p
U C = U A U B q C m o d p
N x C = W C 2 N x A U B 2 q C 2 N x B U A 2 q C 2 m o d p
N y C = W C ( N x A U B 2 q C 2 N x C ) N y A U B 3 q C 3 m o d p
In the case P A  =  P B (higher-order doubling), let P 1 = P A . Then, as proved in Section 3, recursively
W n = 3 N x n / 2 2 + a U n / 2 4 m o d p
q n = 2 N y n / 2 m o d p
U n = q n U n / 2 m o d p
N x n = W n 2 2 N x n / 2 q n 2 m o d p
N y n = W n ( N x n / 2 q n 2 N x n ) N y n / 2 q n 3 m o d p
We rewrite our algorithms to receive N x n , N y n , and U n instead of the x n and y n values. By applying this method, we manage to dispense with computing the inverse at each iteration.
Since all algorithms start with finding the N x 2 and N y 2 values that are related to the point 2 P , we note some adjustments to these algorithms in terms of their inputs, then we get:
N x 2 = ( 3 N x i n 2 + a U i n 4 ) 2 8 N x i n N y i n 2 m o d p
N y 2 = ( 3 N x i n 2 + a U i n 4 ) ( 4 N x i n N y i n 2 N x 2 ) 8 N y i n 4 m o d p
U 2 = 2 N y i n U i n m o d p
where N x i n , N y i n , and U i n are the inputs that represent the point ( X 1 : Y 1 ) at the first iteration where U i n equals one and N x 2 , N x 2 , and U 2 are the outputs that represent the point  2 P .

Numerical Example

In this section, we use the same cyclic group introduced in Section 3 and consider some of the values previously computed in the previous numerical examples sections in order to illustrate how our new coordinate system finds point doubling and addition correctly with a single inverse along the key size.
Assume we have a key size of four bits that represents the number 10 10 = ( 1010 ) 2 . Then, we apply the left-to-right algorithm in order to compute the new x and y coordinates for the point 10P = (7,11).
First, as we scan from left to right we process the second one-bit. Each one-bit is represented by a doubling and addition while each zero-bit is only represented by a doubling. Thus, we double in order to find the point 2P.
As in Section 3, we consider the values,
U 2 = 2
N x 2 = 7
N y 2 = 7
Then, we scan the next bit from the left which appears to be 1. Another double-and-add operation is applied and we get 2(2P) + P = 5P.
KEY:      1        0        1 …
Operations:       2P      5P …
As in Section 4.1, we consider the values for 5P as well,
U 5 = 7
N x 5 = 16
N y 5 = 14
Note: N x 2 , N y 2 , N x 5 , and N y 5 are computed with no inversion operation.
Now, we scan the last bit which appears to be 0. The doubling operation is applied and we get 2(5P) = 10P = (7,11).
KEY:      1        0        1        0
Operations:       2P      5P      10P
W 10 = 3 N x 5 2 + a U 5 4 m o d p
W 10 = 3 ( 16 ) 2 + 2 ( 7 ) 4 m o d 17
W 10 = 11
q 10 = 2 N y 5 m o d p
q 10 = 2 ( 14 ) m o d 17
q 10 = 11
U 10 = q 10 U 5 m o d p
U 10 = 11 ( 7 ) m o d 17
U 14 = 9
N x 10 = W 10 2 2 N x 5 q 10 2 m o d p
N x 10 = ( 11 ) 2 2 ( 16 ) ( 11 ) 2 m o d 17
N x 10 = 6
N y 10 = W 10 ( N x 5 q 10 2 N x 10 ) N y 5 q 10 3 m o d p
N y 10 = 11 ( ( 16 ) ( 11 ) 2 6 ) ( 14 ) ( 11 ) 3 m o d 17
N y 10 = 12
At the end of the last iteration, the inverse function is applied in order to find the affine coordinates for the point 10P.
x 10 = N x 10 U 10 2 = 6 13 = 7
y 10 = N y 10 U 10 3 = 12 15 = 11 where 13 1 = 4 and 15 1 = 8.

6. Fast Multiplication with Mixed-Base Multiplicands

Here follows the description of a few algorithms that can integrate the fast repeated-doubling techniques mentioned so far by applying mixed base multiplicands. With the algorithm m P + n Q , one can compute multiplications with scalars up to 31. One can divide m’s binary representation into blocks of five bits. In case an obtained block represents one of the unimplemented scalar multiplications, such blocks may be reduced in length.

6.1. Double-and-Add Extensions

In Section 3 and Section 4, it was shown how to compute all intermediate exponents and mix the doubling with a differential addition with a single inverse. The left-to-right algorithm starts scanning from the left the next one-bit considering that the most significant bit is one. Then, it decides whether it applies doubling or doubling and addition depending on the data being read. For instance, if the first two one-bits represent the binary equivalent ( 101 ) 2 which is 5 10 , the algorithm multiplies the base by four because it was shifted to the left by two bits. Since the last bit scanned is a one, it also applies a differential addition to the point being doubled with the base point. Thus, the implementation is 4 Q + Q . Figure 1 shows a practical example for calculating Q 47 . This technique computes Q 47 with only four inverses, instead of the eight inverses when performing the original equations. However, by applying our EiSi coordinate system, one can compute the whole key with a single inverse as for the projective technique.
Algorithm 1: Double-and-Add Extensions
Electronics 11 03123 i001
In Line 1 of the pseudocode of the double-and-add extensions in Algorithm 1, we apply the DoubleAndAddKnapsack function taking as parameter the counter l that specifies the current bit location, and the base point P to be added at the end. Otherwise, we apply the DoubleKnapsack function that computes the shifting to the left by multiplying the D value with  2 l .

6.2. Fast Multiplication with Base-32 Multiplicands

Here, we mention a simple special case of an algorithm based on base-32 representations of the multiplicands. Then, for a multiplier of the form q r 32 ¯ the computation is implemented as,
32 ( q P ) + r P m o d p
For the scalar 10,150 = 27 A 6 16 , the obtained algorithm is equivalent to:
( 32 ( 9 P ) + 29 P ) ( 32 ) + 6 P m o d p
As noted in the above equation, and similar to the Montgomery curve, the key is indistinguishable and cannot be recognized by a side-channel attack since the algorithm applies point doubling and addition at each iteration regardless of the key bit value. In addition, by applying direct-doubling algorithms, we benefit from the reduced number of point additions, which in fact costs more than point doubling. Moreover, as noted in Section 5, the EiSi coordinate system operates in two modes. The first is when it receives affine x and y coordinates, while the other deals with N x , N y , and U as inputs. The base-32 multiplicands algorithm increases the use of the first mode, which costs fewer multiplications. Thus, we consider a base-32 multiplicands algorithm as one of the most efficient algorithms.

7. Results and Experiments

Simulation experiments were performed with a Java implementation of the proposed algorithms. We applied the algorithms on large parameters defined in the standard curves P-521, P-384, P-256, and P-224 from the National Institute of Standards and Technology (NIST). In addition, we picked 10 different keys that were randomly generated with an appropriate size for the x and y coordinates of each curve. Each algorithm was executed multiple times and then we computed the average time taken to increase the accuracy of the calculations. Experimentally, our software implementation was tested on a BeagleBone Black (BBB) System kit [29]. The BBB was equipped with a minimum set of features to allow the user to experience the power of the processor [29]. This system is equipped with one of the ARM Cortex-A8 family, AM3358/9 processor [29].

7.1. Functions Description and Properties

In this section, we list the important functions that were used in our software implementation and their properties. Since the EiSi curve receives and returns two different forms of inputs and outputs, (x,y) or ( N x : N y :U), we clarify among these characteristics these details.

7.1.1. doubling 2 n N

This special function was designed to receive and return an EiSi point. Basically, it receives the number of doublings of a point and then builds the equation for implementing this doubling. For example, if one wants to compute the point 6P, it requires finding the point 2P then 4P in order to fulfill the constructional equation for 6P, which is 2P + 4P.

7.1.2. adv_addN2N_N and adv_subN2N_N

These functions receive and return EiSi points. Briefly, they perform point addition and subtraction between two EiSi points.

7.1.3. remi_point

This function receives an affine point and return an EiSi point. In addition, it receives the number of doublings of a point and then builds the equation for implementing this doubling. Mainly, it is used in the base-32 multiplicands algorithm specifically for computing the remainders, where all of them are based on the same base point. It differs from the doubling 2 n N function, where all the doubling algorithms operators and labels are dependent. Basically, the point 4P cannot be computed without finding the point 2P. Moreover, the point 8P cannot be computed without finding the point 2P then 4P. For example, if one wants to compute the third double for the base point 8P = (13,7), it is represented in EiSi coordinates as (16:14:8). The remi_point will compute the N x , N y , and U values for the point 2(8P) then 4(8P) then return the EiSi point of 8(8P) = 7P mod 19 that is represented as (0:14:2).

7.1.4. remi_func

This function works as a control for the remi_point function. The remi_func has architectures of all the doubling algorithms and how they are implemented. Essentially, it has flags to be checked to avoid repeating any previously computed operations. Figure 2 and Figure 3 show practical examples printed from our implementation debug page.
As we notice in Figure 2, at the second block the 2P parameters were not recomputed and similarly at the third block for 8P. Furthermore, in Figure 3, at the last block, we notice that 8P and 3P were previously computed and we only had to perform a point addition.

7.2. Our Work vs. Original

In this section, we compare our algorithms in terms of number of multiplications for our work, base-32 multiplicands and double-and-add, with the original affine algorithm. We implemented the original affine equations with two different algorithms, right-to-left and left-to-right. Table 3 shows the huge differences in the number of multiplications and inversions between these algorithms and our work. On colored background one can see the best results for each benchmark, and they correspond to the Base 32 version of our technique.
As we notice in Table 3, there is a great difference in the number of multiplications and inversions between our work and the original algorithm as our work is faster by approximately 35 up to 83 times for the key sizes of 224 bits and 521 bits, respectively, when comparing with RL and 25 up to 60 times in the case of LR. Obviously, all these differences are caused by the number of inverse operations that the original algorithm requires for each point doubling or addition operation. Figure 4 translates this difference in a chart where our work appears as a straight line along the x-axis.

7.3. Eisi Coordinates vs. Others

Here, we compare our work with the other coordinate systems, projective and Jacobian. Table 4 shows a comparison of these algorithms in terms of the number of additions, subtractions, multiplications, divisions, modulo operations, maximum levels of parallelization, and elapsed time for implementing them on the NIST standard curves P-521, P-384, P-256, and P-224.
As we notice in Table 4, our work which is represented in the last two algorithms is more efficient when it comes to number of multiplications (see entries with colored background). Clearly, the base-32 multiplicands algorithm is the optimal algorithm in this case. Moreover, when we compare by the maximum levels of parallelization, we find that our work outperforms the other coordinates algorithms as well through the base-32 multiplicands algorithm which makes it the optimal algorithm in terms of both factors. Nevertheless, the double-and-add algorithm which represents the original EiSi coordinates appears to be the least efficient in terms of maximum levels; however, together with our direct-doubling technique we outperform all other algorithms in all aspects. Figure 5 and Figure 6 contain graphs that show the comparisons between our work and the other coordinates algorithms in terms of number of multiplications and maximum levels of parallelization with different key sizes.
As can be seen in Figure 5 and Figure 6, all algorithms are graphed as straight lines of varying slopes, which gives us the opportunity to apply a straight-line equation to any algorithm to predict the expected values, whether it is the number of multiplications or the maximum levels of parallelization at the level of a larger key size. Table 5 lists all the equations related to each algorithm.
Predictably, we apply the equations in Table 5 on two key sizes of the prime numbers of 751 and 1013. Table 6 lists the expected number of multiplications and maximum number of levels.
As it can be seen in Table 6, our work represented in the base-32 multiplicands algorithm maintains its place as the optimal algorithm in terms of number of multiplications and maximum levels of parallelization. Likewise, we find that the Jacobian algorithm outperforms the projective algorithm in terms of the same factors, which led us to another comparison between base-32 multiplicands algorithm and the Jacobian coordinates algorithm to monitor if the difference in performance shrank with the size of the key or continued to increase. Despite the slope values in the straight-line equations that show the differences, we computed the delta value, Δ , which was the difference between the y-axis values along the key size. Table 7 shows the comparison between these two algorithms in terms of the same two factors, where
Δ i = y n y m
where i represents the key size and n and m represent the algorithms labels.
We conclude from the Δ values from Table 7 that our results in both cases showed that the improvement scaled with the size of the input.

7.4. Number of Multipliers Comparison

After the tests and comparisons have proven the efficiency of our algorithms and their superiority against other coordinate systems algorithms, in this section we specify the number of multiplication units each algorithm requires to achieve their maximum levels of parallelism. Table 8 shows the number of multipliers per algorithm in the case of a key size of 521.
As it can be seen in Table 8, the appropriate number of multipliers to achieve the highest level of parallelism varies among algorithms. In addition, we note that if we reduce the number of multipliers a little, we may get a very close result in terms of maximum levels of parallelization. Thus, it led us to another close comparison in which we monitored the behavior of each algorithm in comparison with the others in multiple cases where the number of multipliers was uniform. Table 9 shows another comparison between our optimal algorithm specified in the previous sections compared to the Jacobian algorithm, in terms of the maximum levels (MaxLs) at specific numbers of multipliers.
As it can be seen in Table 9, our algorithms outperform the Jacobian algorithm in all levels, starting from a single multiplier, where the base-32 algorithm appears to be 63% more efficient, up to four multipliers, where Jacobian reaches its peak while being 24% slower than the base 32 algorithm. In the two-multiplier case, the performance of both algorithms improves significantly as the difference in efficiency becomes almost 24% with the advantage remaining for our work. We also note that the base-32 and Jacobian algorithms become highly ineffective as they continue to increase by one parallel level by increasing the number of multiplication units each time until they reach their peak. At the end, and in all cases, whether we use fewer or more multipliers, the efficiency of our algorithm clearly outweighs the work of other coordinate systems algorithms. Figure 7 shows the graphical representation of the relationship of the number of multipliers with the maximum levels of parallelism.

8. Discussion

In 2022, NIST released its report on algorithms resistant to quantum computer attacks, with supersingular isogeny key encapsulation, SIKE, as one of the candidates [2]. The organization clarified in its latest report the advantages of the algorithm in terms of security and key shortness, and in return, its biggest flaw was its performance. Since the SIDH algorithm is based on elliptic curve calculations, our proposal in this paper becomes of great importance and support for this algorithm in the field of quantum computer attacks. Later that year, Castryck and Decru presented an efficient key-recovery attack on the SIDH, based on a “glue-and-split” theorem exploiting the knowledge of the starting curve [30]. A short time later, Damien Robert published a paper claiming to break SIDH in a polynomial time even with a random starting curve [31]. Nevertheless, Fouotsa proposed a countermeasure to the Castryck–Decru attack by applying a mask to the torsion-point images where the attack cannot be valid [32]. Simply, they applied a scalar multiplication a where a Z / B Z x to the points p and q. Thus, there will be an impact on performance to maintain security, which makes our contribution more relevant for the application.

9. Conclusions

This research proposed optimization methods for computing scalar multiplication in elliptic curves over a prime field, in the short Weierstrass form in the affine plane. The report started by describing a methodology for direct repeated point doubling with a high order, as well as point addition of the form n P + m Q by using a single inversion. These new algorithms were shown to be significantly faster than the original equations. In addition, we developed optimized equations for repeated doubling of higher order than available with comparable current existing algorithms (up to 31).
The second part introduced a new coordinate system, EiSi, with fast algorithms shown to be offering the lowest cost when using only a single inverse. In fact, EiSi shared the same Jacobian space but with different operators. Parallelization opportunities were also highlighted. The evaluation of our implementation indicated that the proposed equations outperformed the other coordinate systems and also provided a significant speed-up when realized in hardware. Moreover, EiSi with the direct repeated doubling technique was proven more efficient in all aspects evaluated, namely the number of multiplications, maximum levels of parallelization, and estimated time.
The base-32 multiplicands algorithm was one of the multiplicands family of algorithms proposed. This algorithm was characterized by its speed and by the low number of parallel levels required to implement it, namely just three multipliers. In addition, the operators of this algorithm kept the key bit values indistinguishable, as they continued the point doubling and addition process according to the Montgomery procedure, making them similarly resistant to side-channel attacks. The base-32 multiplicands algorithm outperformed other coordinates algorithms in all evaluated aspects.

Author Contributions

Data curation, W.E., T.F.A.-S. and M.C.S.; Formal analysis, W.E., T.F.A.-S. and M.C.S.; Funding acquisition, W.E., T.F.A.-S. and M.C.S.; Methodology, W.E., T.F.A.-S. and M.C.S.; Project administration, W.E., T.F.A.-S. and M.C.S.; Software, W.E., T.F.A.-S. and M.C.S.; Writing—original draft, W.E., T.F.A.-S. and M.C.S.; Writing—review & editing, W.E., T.F.A.-S. and M.C.S. All authors have read and agreed to the published version of the manuscript.

Funding

Deanship of Scientific Research at Umm Al-Qura University grant 20UQU0026DSR.

Data Availability Statement

No data is involved.

Acknowledgments

The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by grant code: (20UQU0026DSR).

Conflicts of Interest

The authors confirm that there is no conflict of interest to declare for this publication.

References

  1. Oliveira, L.B.; Pereira, F.M.Q.; Misoczki, R.; Aranha, D.F.; Borges, F.; Nogueira, M.; Wangham, M.; Wu, M.; Liu, J. The computer for the 21st century: Present security & privacy challenges. J. Internet Serv. Appl. 2018, 9, 24. [Google Scholar]
  2. NIST. SIKE—Supersingular Isogeny Key Encapsulation. 2022. Available online: https://sike.org/ (accessed on 17 August 2022).
  3. Arpin, S.; Camacho-Navarro, C.; Lauter, K.; Lim, J.; Nelson, K.; Scholl, T.; Sotáková, J. Adventures in Supersingularland. arXiv 2019, arXiv:1909.07779. [Google Scholar] [CrossRef]
  4. Costello, C.; Longa, P.; Naehrig, M. Efficient algorithms for supersingular isogeny Diffie-Hellman. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2016; pp. 572–601. [Google Scholar]
  5. Jao, D.; De Feo, L. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In International Workshop on Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2011; pp. 19–34. [Google Scholar]
  6. Montgomery, P.L. Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 1987, 48, 243–264. [Google Scholar] [CrossRef]
  7. Washington, L.C. Elliptic Curves: Number Theory and Cryptography; Chapman and Hall/CRC: Boca Raton, FL, USA, 2008. [Google Scholar]
  8. Miller, V.S. Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 1985; pp. 417–426. [Google Scholar]
  9. Koblitz, N. Elliptic curve cryptosystems. Math. Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
  10. Chen, L.; Chen, L.; Jordan, S.; Liu, Y.K.; Moody, D.; Peralta, R.; Perlner, R.; Smith-Tone, D. Report on Post-Quantum Cryptography; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2016.
  11. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
  12. Eisenträger, K.; Lauter, K.; Montgomery, P.L. Fast elliptic curve arithmetic and improved Weil pairing evaluation. In Cryptographers’ Track at the RSA Conference; Springer: Berlin/Heidelberg, Germany, 2003; pp. 343–354. [Google Scholar]
  13. Ciet, M.; Joye, M.; Lauter, K.; Montgomery, P.L. Trading inversions for multiplications in elliptic curve cryptography. Des. Codes Cryptogr. 2006, 39, 189–206. [Google Scholar] [CrossRef]
  14. Dimitrov, V.; Imbert, L.; Mishra, P.K. Efficient and secure elliptic curve point multiplication using double-base chains. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2005; pp. 59–78. [Google Scholar]
  15. Mishra, P.K.; Dimitrov, V. Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation. In International Conference on Information Security; Springer: Berlin/Heidelberg, Germany, 2007; pp. 390–406. [Google Scholar]
  16. Longa, P.; Miri, A. New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version). IACR Cryptol. EPrint Arch. 2008, 2008, 52. [Google Scholar]
  17. Purohit, G.; Rawat, A.S. Fast scalar multiplication in ECC using the multi base number system. Int. J. Comput. Sci. Issues 2011, 8, 131. [Google Scholar]
  18. Childs, A.; Jao, D.; Soukharev, V. Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 2014, 8, 1–29. [Google Scholar] [CrossRef]
  19. Gutub, A. Efficient utilization of scalable multipliers in parallel to compute GF (p) elliptic curve cryptographic operations. Kuwait J. Sci. Eng. 2007, 34, 165–182. [Google Scholar]
  20. Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  21. Smart, N.P. Cryptography Made Simple; Springer: Berlin/Heidelberg, Germany, 2016; Volume 481. [Google Scholar]
  22. Higuchi, A.; Takagi, N. A fast addition algorithm for elliptic curve arithmetic in GF (2n) using projective coordinates. Inf. Process. Lett. 2000, 76, 101–103. [Google Scholar] [CrossRef]
  23. Okeya, K.; Miyazaki, K.; Sakurai, K. A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. In International Conference on Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2001; pp. 428–439. [Google Scholar]
  24. Eichler, M.; Zagier, D. The Theory of Jacobi Forms; Springer: Berlin/Heidelberg, Germany, 1985; Volume 55. [Google Scholar]
  25. Liardet, P.Y.; Smart, N.P. Preventing SPA/DPA in ECC systems using the Jacobi form. In International Workshop on Cryptographic Hardware and Embedded Systems; Springer: Berlin/Heidelberg, Germany, 2001; pp. 391–401. [Google Scholar]
  26. Billet, O.; Joye, M. The Jacobi model of an elliptic curve and side-channel analysis. In International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes; Springer: Berlin/Heidelberg, Germany, 2003; pp. 34–42. [Google Scholar]
  27. López, J.; Dahab, R. Improved algorithms for elliptic curve arithmetic in GF (2 n). In International Workshop on Selected Areas in Cryptography; Springer: Berlin/Heidelberg, Germany, 1998; pp. 201–212. [Google Scholar]
  28. Rao, S.R.S. Three dimensional montgomery ladder, differential point tripling on montgomery curves and point quintupling on Weierstrass’ and Edwards curves. In International Conference on Cryptology in Africa; Springer: Berlin/Heidelberg, Germany, 2016; pp. 84–106. [Google Scholar]
  29. Coley, G. Beaglebone black system reference manual. Tex. Instrum. Dallas 2013, 5. Available online: https://cdn-shop.adafruit.com/product-files/1996/BBB_SRM.pdf (accessed on 17 August 2022).
  30. Castryck, W.; Decru, T. An Efficient Key Recovery Attack on SIDH (Preliminary Version). Cryptology ePrint Archive, Paper 2022/975. 2022. Available online: https://eprint.iacr.org/2022/975 (accessed on 17 August 2022).
  31. Robert, D. Breaking SIDH in Polynomial Time. Cryptology ePrint Archive, Paper 2022/1038. 2022. Available online: https://eprint.iacr.org/2022/1038 (accessed on 17 August 2022).
  32. Fouotsa, T.B. SIDH with Masked Torsion Point Images. Cryptology ePrint Archive, Paper 2022/1054. 2022. Available online: https://eprint.iacr.org/2022/1054 (accessed on 17 August 2022).
Figure 1. Left-to-Right Proposed Algorithm.
Figure 1. Left-to-Right Proposed Algorithm.
Electronics 11 03123 g001
Figure 2. Computing the point 24P by using remi_func and remi_point functions.
Figure 2. Computing the point 24P by using remi_func and remi_point functions.
Electronics 11 03123 g002
Figure 3. Computing the point 29 P by using remi_func and remi_point functions.
Figure 3. Computing the point 29 P by using remi_func and remi_point functions.
Electronics 11 03123 g003
Figure 4. Our work vs. Original algorithms in Terms of Number of Multiplications: blue and red lines are superposed.
Figure 4. Our work vs. Original algorithms in Terms of Number of Multiplications: blue and red lines are superposed.
Electronics 11 03123 g004
Figure 5. Our Work vs. Other Coordinates Algorithms in Terms of Number of Multiplications.
Figure 5. Our Work vs. Other Coordinates Algorithms in Terms of Number of Multiplications.
Electronics 11 03123 g005
Figure 6. Our Work vs. Other Coordinates Algorithms in Terms of Number of Maximum Number of Levels.
Figure 6. Our Work vs. Other Coordinates Algorithms in Terms of Number of Maximum Number of Levels.
Electronics 11 03123 g006
Figure 7. Maximum Levels for Different Number of Multipliers.
Figure 7. Maximum Levels for Different Number of Multipliers.
Electronics 11 03123 g007
Table 1. Intermediate Algorithms General Forms.
Table 1. Intermediate Algorithms General Forms.
FormsAlgorithms
2 n P + P W n + m = N y n y 1 U n 3
q n + m = N x n x 1 U n 2
U n + m = U n q n + m
x n + m = W n + m 2 x 1 U n + m 2 N x n q n + m 2 U n + m 2
y n + m = W n + m ( x 1 U n + m 2 N x n + m ) y 1 U n + m 3 U n + m 3
2 n P + 2 P W n + m = N y n 8 N y m 4
q n + m = N x n 4 N x m N y m 2
U n + m = U n q n + m
x n + m = W n + m 2 4 N x m N y m 2 q n + m 2 N x n q n + m 2 U n + m 2
y n + m = W n + m ( 4 N x m N y m 2 q n + m 2 N x n + m ) 8 N y m 4 q n + m 3 U n + m 3
2 ( n P ) W 2 n = 3 N x n 2 + a U n 4
q 2 n = 2 N y n
U 2 n = U n q 2 n
x 2 n = W 2 n 2 2 N x n q 2 n 2 U 2 n 2
y 2 n = W 2 n ( N x n q 2 n 2 N x 2 n ) N y n q 2 n 3 U 2 n 3
2 ( n P ) + P W 2 n + 1 = N y 2 n y 1 U 2 n 3
q 2 n + 1 = N x 2 n x 1 U 2 n 2
U 2 n + 1 = U 2 n q 2 n + 1
x 2 n + 1 = W 2 n + 1 2 x 1 U 2 n + 1 2 N x 2 n q 2 n + 1 2 U 2 n + 1 2
y 2 n + 1 = W 2 n + 1 ( x 1 U 2 n + 1 2 N x 2 n + 1 ) y 1 U 2 n + 1 3 U 2 n + 1 3
Table 2. Structure and Cost for All Intermediate Algorithms.
Table 2. Structure and Cost for All Intermediate Algorithms.
AlgorithmsStructureNumber of Multiplications
3P2P + P19
5P4P + P28
6P4P + 2P26
7P/9P8P ± P38
10P2(5P)38
11P2(5P) + P51
12P2(6P)36
13P2(6P) + P49
14P/18P2(7/9P)48
15P/17P16P ± P48
19P2(9P) + P61
20P2(10P)46
21P2(10P) + P61
22P2(11P)62
23P/25P2(12P) ± P59
24P2(12P)46
26P2(13P)59
27P2(14P) − P71
28P2(14P)58
29P2(15P) − P71
30P2(15P)58
31P32PP58
Table 3. Our Work vs. Original Algorithms Measurements.
Table 3. Our Work vs. Original Algorithms Measurements.
NIST CurveAlgorithmNumber of Operations
Mult.Inv.
P-521RL (original)658,5141059
LR (original)478,056778
DA91621
Base 3279211
P-384RL (original)355,788775
LR (original)259,177569
DA67141
Base 3258901
P-256RL (original)162,131519
LR (original)115,340378
DA44661
Base 3240071
P-224RL (original)123,461450
LR (original)88,921332
DA39211
Base 3235291
Table 4. EiSi Coordinates vs. Other Coordinates Measurements.
Table 4. EiSi Coordinates vs. Other Coordinates Measurements.
NIST CurveAlgorithmNumber of OperationsTime ms
Mult.Div.ALUsMod.MaxLs
P-521Projective14,900315421117,89993901035
Jacobian13,312301419715,8218862884
Base 327921296651812,2907123778
DA9162301784818,5289924951
P-384Projective10,901226307813,1076871554
Jacobian9752222307511,5876491480
Base 325890227483391135224421
DA6714222574613,5567267508
P-256Projective7236145204387144564286
Jacobian6488147204677084316261
Base 324007150327762103463227
DA4466147382090284833266
P-224Projective6356127179676564010234
Jacobian5697127179667733790215
Base 323529132288654723041193
DA3921127335479314243218
Table 5. List of Algorithms’ Linear Equations.
Table 5. List of Algorithms’ Linear Equations.
AlgorithmEquation: Number of Mult.Equation: Number of MaxLs
Base 32 y = 14.777 x + 220.37 y = 13.762 x 52.445
DA y = 17.658 x 48.287 y = 19.139 x 60.183
Jacobian y = 25.656 x 70.992 y = 17.089 x 52.485
Projective y = 28.795 x 121.85 y = 18.131 x 69.095
Table 6. Expected number of Multiplications and Maximum Levels with Key of Sizes 751 and 1013.
Table 6. Expected number of Multiplications and Maximum Levels with Key of Sizes 751 and 1013.
AlgorithmExpected Number of Mult.Expected Number of MaxLs
75110137511013
Base 3211,31715,18910,28213,888
DA13,21217,83914,31319,327
Jacobian19,19625,91812,78117,258
Projective21,50329,04713,54718,297
Table 7. Δ Values for Base 32 vs. Jacobian.
Table 7. Δ Values for Base 32 vs. Jacobian.
Key SizeNumber of Mult.Number of MaxLs
Base 32 vs. JacobianBase 32 vs. Jacobian
2242168749
2562481853
38438621267
52153911739
75178792499
101310,7293370
Table 8. The Number of Multipliers Appropriate to Achieve the Highest Level of Parallelism.
Table 8. The Number of Multipliers Appropriate to Achieve the Highest Level of Parallelism.
AlgorithmNumber of MaxLsMultipliers
DA99203
Base 3271333
Projective93706
Jacobian88624
Table 9. Maximum Levels at Different Numbers of Multipliers.
Table 9. Maximum Levels at Different Numbers of Multipliers.
MultipliersAlgorithmNumber of MaxLs
1Base 327982
Jacobian13,011
2Base 327134
Jacobian8864
3Base 327133
Jacobian8863
4Base 327133
Jacobian8862
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Eid, W.; Al-Somani, T.F.; Silaghi, M.C. Efficient Elliptic Curve Operators for Jacobian Coordinates. Electronics 2022, 11, 3123. https://doi.org/10.3390/electronics11193123

AMA Style

Eid W, Al-Somani TF, Silaghi MC. Efficient Elliptic Curve Operators for Jacobian Coordinates. Electronics. 2022; 11(19):3123. https://doi.org/10.3390/electronics11193123

Chicago/Turabian Style

Eid, Wesam, Turki F. Al-Somani, and Marius C. Silaghi. 2022. "Efficient Elliptic Curve Operators for Jacobian Coordinates" Electronics 11, no. 19: 3123. https://doi.org/10.3390/electronics11193123

APA Style

Eid, W., Al-Somani, T. F., & Silaghi, M. C. (2022). Efficient Elliptic Curve Operators for Jacobian Coordinates. Electronics, 11(19), 3123. https://doi.org/10.3390/electronics11193123

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop