Koblitz exponentiation with bucketing
First Claim
1. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of eltiptic curve exponentiation for subfield curves used in cryptography, the method comprising:
- forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w);
gathering elements of the Frobenius expansion into collections of elements having matching coefficients;
merging the collections;
selecting the set of coefficients (ci) from elements of Z[τ
] that are congruent to odd integers modulo 2w; and
using the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
2 Assignments
0 Petitions
Accused Products
Abstract
An implementation of a technology, described herein, for facilitating cryptographic systems and techniques. At least one implementation, described herein, maximizes the speed and security of fast exponentiation while minimizing its expense. At least one implementation, described herein, employs elliptic curves with a fast exponentiation technique so that it maximizes speed and security while minimizing expense. At least one implementation, described herein, employs Koblitz exponentiation with “bucketing” techniques to maximize speed and security of cryptosystems while minimizing expense of such techniques. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
-
Citations
10 Claims
-
1. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of eltiptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; selecting the set of coefficients (ci) from elements of Z[τ
] that are congruent to odd integers modulo 2w; andusing the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
2. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; selecting the set of coefficients (ci) from elements of Z[τ
] that are congruent to odd integers modulo 2w, wherein τ
2±
τ
+2=0; andusing the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
3. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; selecting the set of coefficients (ci) from elements of Z[τ
] that are congruent to odd integers modulo 2w or to the negative of odd integers modulo 2w;using the elliptic curve exponentiation during generation of at least art of a cryptographic key for securing data via encryption.
-
-
4. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; selecting the set of coefficients (ci) from elements of Z[τ
] that are congruent to odd integers modulo 2w, for the width w, wherein the selecting is under 2-adic homomorphism; andusing the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
5. A computer-readable medium having at least one physical media and having computer-executable instructions that when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; wherein during the merging, simultaneously performing multiple curve additions of points on the elliptic curve; and using the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
6. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for subfield curves used in cryptography, the method comprising:
-
forming, with a set of coefficients (ci), a Frobenius expansion of an exponent, the Frobenius expansion having a width (w); gathering elements of the Frobenius expansion into collections of elements having matching coefficients; merging the collections; wherein during the merging, performing joint addition/subtraction of points on the elliptic curve; and using the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
7. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of exponentiation used in cryptography, the method comprising:
-
gathering elements of an expansion of an exponent into collections of elements, wherein the elements of a collection have matching coefficients; merging the collections of elements; wherein during the merging, simultaneously performing multiple curve additions of points on an elliptic curve associated with the exponentiations; and using the exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
8. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of exponentiation used in cryptography, the method comprising:
-
gathering elements of an expansion of an exponent into collections of elements, wherein the elements of a collection have matching coefficients; merging the collections of elements; wherein during the merging, performing joint addition/subtraction of points on an elliptic curve associated with the exponentiation; and using the exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
9. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for Koblitz curves used in cryptography, the method comprising:
-
gathering elements of a Frobenius expansion of an exponent into collections of elements, the elements of a collection having matching coefficients, wherein the Frobenius expansion is formed with a set of coefficients (ci), powers of τ
, and expansion having a width (w);merging the collections of elements; wherein merging comprises simultaneously performing multiple curve additions of points on the elliptic curve; and using the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
-
10. A computer-readable medium having at least one physical media and having computer-executable instructions that, when executed by a computer, perform a method to improve the speed and security of elliptic curve exponentiation for Koblitz curves used in cryptography, the method comprising:
-
gathering elements of a Frobenius expansion of an exponent into collections of elements, the elements of a collection having matching coefficients, wherein the Frobenius expansion is formed with a set of coefficients (ci), powers of τ
, and expansion having a width (w);merging the collections of elements; wherein merging comprises performing joint addition/subtraction of points on the elliptic curve; and using the elliptic curve exponentiation during generation of at least part of a cryptographic key for securing data via encryption.
-
Specification