期刊文献+

GF(p)上椭圆曲线密码的并行基点选取算法研究 被引量:1

Research on Parallel Algorithm of Selecting Base Points of Elliptic Curve Cryptography over GF(p)
下载PDF
导出
摘要 提出一种GF(p)上椭圆曲线密码系统的并行基点选取算法,该算法由并行随机点产生算法和并行基点判断算法两个子算法组成,给出了算法性能的理论分析和实验结果。结果表明:各并行处理器单元具有较好的负载均衡特性;当执行并行基点判断算法,其标量乘的点加计算时间是点倍数计算时间的三倍时,算法的并行效率可达90%。因此该算法可用于椭圆曲线密码(Elliptic Curve Cryptography,ECC)中基点的快速选取,从而提高ECC的加/解密速度。 This paper proposed a parallel algorithm of selecting base points of elliptic curve cryptography(ECC) over GF(ρ). The proposed parallel algorithm was composed of two sub-algorithms: parallel finding the random points of the elliptic curve (EC) cryptography and parallel judging whether or not the random point was the base point. Next the performances were theoretically analyzed and the experiment results were also given. The results show: all processors have better load balance; when the ratio of the execution time of a point addition to that of a point doubling is 3 during computing the scalar multiplication, the parallel efficiency of the proposed algorithm is up to 90%. Therefore, the proposed parallel algorithm can be applied to speed the selection of the base point of the elliptic curve cryptography over GF(ρ), improving the speed of encryption and decryption of ECC.
作者 刘晓玲
出处 《计算机应用研究》 CSCD 北大核心 2007年第4期33-36,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60273075) 教育部重点资助项目(105128) 中国网上教育平台试点工程资助项目(计高技[2000]2034)
关键词 椭圆曲线密码 椭圆曲线 标量乘 并行算法 基点 ECC( elliptic curve cryptography) elliptic curve scalar multiplication parallel algorithm base point
  • 相关文献

参考文献11

  • 1DIFFIE W, HELLMANW E. New direction in cryptography [J].IEEE Transactions on Information Theory, 1976, IT- 22 ( 11 ) :644-654.
  • 2张金山.用分布式并行算法选取GF〔p〕上椭圆曲线的基点[J].计算机仿真,2004,21(4):54-55. 被引量:3
  • 3侯整风,李岚.椭圆曲线密码系统(ECC)整体算法设计及优化研究[J].电子学报,2004,32(11):1904-1906. 被引量:30
  • 4张方国,王常杰,王育民.GF(p)上安全椭圆曲线及其基点的选取[J].电子与信息学报,2002,24(3):377-381. 被引量:16
  • 5ANSARI B, WU Huapeng. Parallel scalar muhiplication for elliptic curve cryptosystems:proceedings of International Conference on Communications, Circuits and Systems[ C]. [S. 1. ]:[s. n. ] ,2005:71-73.
  • 6王许书,王昭顺,曲英杰.基于复合域上的椭圆曲线密码体制的计算算法[J].小型微型计算机系统,2002,23(8):1007-1009. 被引量:4
  • 7BLAKE I F, SEROUSSI G, SMART N. Ellipitic curves in cryptography [ M ]. Cambridge : Cambridge University Press, 2002.
  • 8MoLLER Bodo. Parallelizable elliptic curve point muhiplication method with resistance against side channel Attacks [ C ]//CHAN A H,GLIGOR. Information Security ISC 2002 [ C ]. [ S. 1. ] : Springer,2002.
  • 9TETSUYA I, TSUYOSHI T. A fast parallel elliptic curve multiplication resistance against side channel attacks : PKC 2002 [ C ]. [ S. 1. ] :Springer-Verlag ,2002:280- 297.
  • 10Muhipreeision integer and rational arithmetic C/C + + library ( MIRACL) [EB/OL]. [ 2002 ]. http://indigo. ie/-mscott/#Elliptic.

二级参考文献30

  • 1[2]V.Miller,Uses of elliptic curves in cryptography,Advances in Cryptology-CRYPTO' 85.LNCS218,Santa Barbara,Calif.,Springer-Verlag,1986,417-426.
  • 2[3]Multiprecision Integer and Rational Arithmetic C/C++ Library(MIRCAL),available at http://indigo.ie/~msoott/.
  • 3[4]A.Menezes,T.Okamnoto,S.Vanstone,Reducing elliptic curve logarithms to logarithms in a finitoe field.IEEE Trans.on Information Theory,1993,39(5),1639-1646.
  • 4[5]N.Koblitz,A Course in Number Theory and Cryptogralphy,2nd e7ition.Spring-Verlag.1994.Ch.6.
  • 5[6]N.Koblitz,Algebraic Aspects of Cryptography,Algorithms and Computation in Math.Editors:E.Becker,M.Bronstein,H.Cohen,3(1998),Berlin Heidelberg,Springer-Verlag,1998,Ch.6.
  • 6[7]IEEE P1363,Standard Specifications for Public-Key Cryptography,Ballot Draft.1999,Drafts available at http://indigo,ie/~msoott/.
  • 7[8]R.Schoof,Elliptic curves over finite fields and the computation of square roots modp.Math.Comp.,1985,44(170),483-494.
  • 8[9].T.Izu,J.kogure,M.Noro,K.Yokoyama,Efficient Implementation of Sehoof's Algorithm.Asi acrypt'98,Berlin Heidelberg,Springer-Verlag,1998,66-79.
  • 9[10]Lehmann,Maurer,Mueller,Shoup ,Counting the number of points on elliptic curves over finite fields of characteristic greater than three,Proc.1st Algorithmic Number Theory Symposinn (ANTS),Berlin Heidelberg,Springer-Verlag,1994,LNCS877,60-70.
  • 10[1]N.Koblitz,Elliptic curve cryptosystems,Mathematics of Computation,1987,45(177),203-209.

共引文献48

同被引文献9

  • 1张金山.用分布式并行算法选取GF〔p〕上椭圆曲线的基点[J].计算机仿真,2004,21(4):54-55. 被引量:3
  • 2SOLINAS J A.An improved algorithm for arithmetic on a family of elliptic curves[C]// Proc of Advances in Cryptology-CRYPTO '97.1997:357-371.
  • 3OpenMP Architecture Review Board.OpenMP specifications v3.0[S/OL].(2008-05).http://www.openmp.org/mp-documents/spec30.pdf.
  • 4OUINN M J.Parallel programming in C with MPI and OpenMP[M].[S.l.]:Brooks/McGraw-Hill,2003.
  • 5IEEE P1363,Standard specifications for public-key cryptography[S/OL].(1999).http://indigo,ie/-msoott/.
  • 6BLAKE I F,SMARTN S.Elliptic curves in cryptography[M].Cambridge:Cambridge University Press,2002.
  • 7KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 8ANSARI B,WU Hua-peng.Parallel scalar multiplication for elliptic curve cryptosystems[C]// Proc of International Conference on Communications,Circuits and Systems.2005:71-73.
  • 9王许书,王昭顺,曲英杰.基于复合域上的椭圆曲线密码体制的计算算法[J].小型微型计算机系统,2002,23(8):1007-1009. 被引量:4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部