Hardware and Software Normal Basis Arithmetic for Pairing Based

Hardware and Software Normal Basis Arithmetic for Pairing Based

Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in ? Characteristic Three R. Granger, D. Page and M. Stam Department of Computer Science, University of Bristol, MerchantVenturers Building, Wo o dland Road, Bristol, BS8 1UB, United Kingdom. fgranger, page, [email protected] Abstract. Although identity based cryptography o ers a number of functional advantages over conventional public key metho ds, the compu- tational costs are signi cantly greater. The dominant part of this cost is the Tate pairing which, in characteristic three, is b est computed using the algorithm of Duursma and Lee. However, in hardware and constrained environments this algorithm is unattractive since it requires online com- putation of cub e ro ots or enough storage space to pre-compute required results. We examine the use of normal basis arithmetic in characteristic three in an attempt to get the b est of b oth worlds: an ecient metho d for computing the Tate pairing that requires no pre-computation and that may also be implemented in hardware to accelerate devices such as smart-cards. Since normal basis arithmetic in characteristic three has not received much attention b efore, we also discuss the construction of suitable bases and asso ciated curve parameterisations. 1 Intro duction Since it was rst suggested in 1984 by Shamir [29], the concept of identity based cryptography has b een an attractive target for researchers b ecause of the p oten- tial for simplifying conventional approaches to public key based systems. The central idea is that the public key for a user is simply their identity and is hence implicitly known to all other users. Identity is a exible concept but an often used concrete example is that of an email address. Within this context, an identity for Alice might b e the string [email protected] ? This work has b een submitted to the IEEE for p ossible publication. Copyrightmay b e transferred without notice, after which this version may no longer b e accessible. If Bob wants to send Alice secure email, he implicitly knows her email address and hence her identity and public key. Therefore he can encrypt the email to her without the same level of involvement from, for example, certi cate and trust authorities. Recent advances have pro duced many workable instances of identity based cryptography whichwere driven mainly by the seminal work of Sakai, Ohgishi and Kasahara [27] and then by Boneh and Franklin [4] who b oth prop osed concrete cryptographic schemes based on pairings on elliptic curves. For suchschemes to b e feasible, one needs an eciently computable pairing, or bilinear map. Generally the Tate pairing is selected for this task and is com- puted using one of several algorithms, such as that of Barreto, Kim, Lynn and Scott [2] or Duursma and Lee [6]. In characteristic three, which is often selected due to the bandwidth advantages of the parameterisation, the Duursma-Lee al- gorithm is certainly faster and recentwork shows that it is probably the current b est choice [10, 28]. However, unlike the BKLS algorithm, it requires the compu- tation of cub e ro ot op erations which are relatively slow when using a p olynomial basis representation. Although these cub e ro ots can b e pre-computed online us- ing cubings, the space requirement is so signi cant, in constrained or hardware environments the metho d is unattractive as a result. As such, this feature means identity based cryptography is currently to o exp ensive to run on naturally iden- tityaware devices. Normal bases [9] o er a convenient solution to this problem since cub e and cub e ro ot op erations are simply cyclic shifts of the co ecients of an element. Indeed, this seems to b e the metho d Duursma and Lee envisaged using in their original pap er, yet without investigating how [6]. Therein lies the catch: normal bases have a drawback in that multiplication is a more complex, and to a cer- tain extent less studied op eration compared to p olynomial bases. To construct a high p erformance implementation of Duursma-Lee that takes advantage of the prop erties of normal bases, ecientmultiplication metho ds are required. In char- acteristic three, we are not aware of anywork that addresses this problem and we attempt to ll the gap in the literature with this pap er. We present metho ds for constructing an appropriate basis, as well as software and hardware algo- rithms for arithmetic in it. Our p erformance and cost results indicate that using normal bases in software is unattractive due to the cost of multiplication, but that this cost can b e avoided by parallel architectures in hardware. The use of hardware acceleration for normal bases thus makes identity based cryptography on constrained devices such as smart-cards a far more feasible prop osition. Note that it is imp ortant to lo ok at the cost of software and hardware metho ds: in a standard implementation it is unattractiveto convert b etween representations where, for example, a smart-card might use hardware acceleration and a desktop computer, which might utilise software comp onents only. The pap er is organised as follows. Firstly,we use Section 2 to overview the mathematics that underpin pairing based cryptography, paying particular at- tention to the Duursma-Lee algorithm that motivates the use of normal basis arithmetic. We then discuss how to construct such normal bases for characteristic three elds in Section 3 and suitable curve parameterisations in Section 4. Arith- metic with and representation of elds elements is presented in Section 5 b efore software and hardware implementation results are intro duced in Sections 6 and 7 resp ectively. Finally we present some concluding remarks in Section 8. 2 Pairing Based Cryptography The existence of eciently computable, non-degenerate bilinear maps, or pair- ings, has allowed cryptographers to explore avenues of research which had previ- ously b een uninstantiable [29]. Originally used as a metho d of attack on elliptic curve cryptosystems [7, 21], the constructive p otential of pairings based on ellip- tic curves is nowwell-studied, with many proto cols and applications [4, 5, 13, 16]. To supp ort these applications much research activity has fo cused on devel- oping ecient and easily implementable algorithms for their deployment [2, 6, 8]. Currently the most ecient metho d for pairing computation is the Duursma-Lee algorithm [6, 10], which applies to sup ersingular elliptic curves in characteristic three with MOVemb edding degree six [21]. As well as pairing evaluation b eing approximately two and a half times faster than with the BKLS algorithm [2], the emb edding degree of six, while not optimal in terms of the relative security requirements for discrete logarithm algorithms in characteristic three nite elds and elliptic curves, still o ers a go o d security/eciency trade-o for contemp o- rary key-size recommendations. In this section we give a brief summary of the mathematics underlying the reduced Tate pairing, as develop ed in [2, 8], and give details of its Duursma-Lee variant, whichwe refer to as the mo di ed Tate pairing. 2.1 The reduced Tate pairing We rst intro duce some notation. Let E b e an elliptic curveover a nite eld F , q and let O denote the identity element of the asso ciated group of rational p oints E on E F . For a p ositiveinteger l coprime to q , let F k b e the smallest extension q q F . Also, let E F [l ] denote eld of F which contains the l -th ro ots of unityin q q q the subgroup of E F of all p oints of order dividing l , and similarly for the q degree k extension of F .From an eciency p ersp ective, k is usually chosen to q be even [2]. For a thorough treatment of the following, we refer the reader to [2] and also [8], and to [30] for an intro duction to divisors. The reduced Tate pairing of order l is the map l e : E F [l ] E F k [l ] ! F =F ; k k l q q q q given by e P; Q=f D . Here f is a function on E whose divisor is equiva- l P;l P;l lenttol P l O , D is a divisor equivalenttoQ O , whose supp ort is dis- E E Q P a i joint from the supp ort of f , and f D = f P , where D = a P . P;l P;l P;l i i i i i It satis es the following prop erties: { For each P 6= O there exists Q 2 E F k [l ] such that e P; Q 6= 1 2 E l q l F =F non-degeneracy. k k q q Field Field Polynomial Curve Order MOV security 79 26 2 3 79 40 79 F t + t +2 Y = X X 1 3 +3 +1 750 3 97 12 2 3 97 49 97 F t + t +2 Y = X X +1 3 +3 +1=7 906 3 163 80 2 3 163 82 16 3 F t + t +2 Y = X X 1 3 +3 +1 1548 3 193 12 2 3 193 97 19 3 F t + t +2 Y = X X 1 3 3 +1 1830 3 239 24 2 3 239 120 23 9 F t + t +2 Y = X X 1 3 3 +1 2268 3 353 142 2 3 353 177 35 3 F t + t +2 Y = X X 1 3 +3 +1 3354 3 Table 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    22 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us