Improving the Performance of {0,1,3}-NAF Recoding Algorithm for Elliptic Curve Scalar Multiplication
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
Although scalar multiplication is highly fundamental to elliptic curve cryptography (ECC), it is the most time-consuming operation. The performance of such scalar multiplication depends on the performance of its scalar recoding which can be measured in terms of the time and memory consumed, as well as its level of security. This paper focuses on the conversion of binary scalar key representation into {0, 1, 3}-NAF non-adjacent form. Thus, we propose an improved {0, 1, 3}-NAF lookup table and mathematical formula algorithm which improves the performance of {0, 1, 3}-NAF algorithm. This is achieved by reducing the number of rows from 15 rows to 6 rows, and reading two (instead of three) digits to produce one. Furthermore, the improved lookup table reduces the recoding time of the algorithm by over 60% with a significant reduction in memory consumption even with an increase in key size. Specifically, the improved lookup table reduces the memory consumption by as much as 75% for the big key, which shows its higher level of resilience to side channel attacks.
Authors and Affiliations
Waleed K. AbdulRaheem, Sharifah Bte Md Yasin, Nur Izura Binti Udzir, Muhammad Rezal bin Kamel Ariffin
Human Gesture Recognition using Keyframes on Local Joint Motion Trajectories
Human Action Recognition (HAR) systems are systems that recognize and classify the actions that users perform against the sensor or camera. In most HAR systems, an input test data is compared with the reference data in t...
Improving Web Page Prediction Using Default Rule Selection
Mining user patterns of web log files can provide significant and useful informative knowledge. A large amount of research has been done in trying to predict correctly the pages a user will most likely request next. Mark...
Evaluating Cancer Treatment Alternatives using Fuzzy PROMETHEE Method
The aim of this study is to apply the principle of multi-criteria decision making theories on various types of cancer treatment techniques. Cancer is an abnormal cell that divides in an uncontrolled manner, it is a growt...
Web Anomaly Misuse Intrusion Detection Framework for SQL Injection Detection
Databases at the background of e-commerce applications are vulnerable to SQL injection attack which is considered as one of the most dangerous web attacks. In this paper we propose a framework based on misuse and a...
Aquabot: A Diagnostic Chatbot for Achluophobia and Autism
Chatbots or chatter bots have been a good way to entertain one. This paper emphasizes on the use of a chatbot in the diagnosis of Achluophobia – the fear of darkness and autism disorder. Autism and Achluophobia (fear of...