Efficient and Constant Time Modular Reduction With Generalized Mersenne Primes

被引:0
|
作者
Erdem, Serdar S. [1 ]
Erdem, Sezer S. [2 ]
机构
[1] Gebze Tech Univ, Dept Elect Engn, TR-41400 Gebze, Kocaeli, Turkiye
[2] Istanbul Univ Cerrahpasa, Vocat Sch Tech Sci, TR-34320 Istanbul, Turkiye
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Software; Cryptography; Software algorithms; Elliptic curves; Elliptic curve cryptography; Arithmetic; Object recognition; Mathematical models; Generalized Mersenne prime; elliptic curve cryptography; modular reduction; SPA;
D O I
10.1109/ACCESS.2024.3514918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many cryptographic applications require a vast number of modular multiplications with a large prime modulus. Generalized Mersennes are a class of primes commonly used in cryptography because of their special forms. When modulus is a generalized Mersenne prime, modular reductions can be calculated efficiently by several additions and subtractions thanks to their special forms. This work modifies the classical reduction algorithms for generalized Mersenne primes in the literature such that the additions and subtractions in these algorithms are performed in parallel from lower digits to higher digits, and the resulting carries and borrows are propagated together. Because calculated values can be negative, two's complement arithmetic is used in calculations. The proposed algorithms have substantial speed improvements over the classical algorithms in software. Also, because reduction modulo an n bit special prime p is performed by a series of n-bit additions and subtractions, a small delta bit overflow may occur in the result such that delta << n . Thus, a final reduction is needed after main reduction. In this work, we prove that the final reduction can be achieved by at most two subtractions where the modulus p >= 2(n)/(1+2(-delta+1)) . And, we show that this lower bound is satisfied by the special primes commonly used in cryptography including the generalized Mersenne primes in practical applications. The proposed modular reduction algorithms handle the final reduction by two subtractions in constant time to avoid timing attacks.
引用
收藏
页码:189307 / 189316
页数:10
相关论文
共 50 条
  • [21] Generalized Time-Limited Balanced Reduction Method
    Shaker, Hamid Reza
    Shaker, Fatemeh
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 5530 - 5535
  • [22] Generalized Nets Model of Dimensionality Reduction in Time Series
    Krawczak, Maciej
    Szkatula, Grazyna
    INTELLIGENT SYSTEMS'2014, VOL 2: TOOLS, ARCHITECTURES, SYSTEMS, APPLICATIONS, 2015, 323 : 847 - 858
  • [23] Generalized Time Limited Gramian based Model Reduction
    Kumar, Deepak
    Jazlan, Ahmad
    Sreeram, Victor
    2017 AUSTRALIAN AND NEW ZEALAND CONTROL CONFERENCE (ANZCC), 2017, : 47 - 49
  • [24] The Assignment of Generalized Time Constant for A Non-All-Pole System
    Qiao, Yue
    Ma, Chengbin
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2015, 62 (07) : 4276 - 4287
  • [25] TIME-CONSTANT REDUCTION IN CHARGE-SENSITIVE PREAMPLIFIERS
    GOLDSWOR.WW
    NUCLEAR INSTRUMENTS & METHODS, 1967, 54 (02): : 301 - &
  • [26] Area-Efficient Modular Reduction Structure and Memory Access Scheme for NTT
    Guo, Wenbo
    Li, Shuguo
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [27] Efficient material reduction at maximum up time
    不详
    ZKG INTERNATIONAL, 2006, 59 (05): : 36 - 36
  • [28] Practically Efficient RFID Scheme with Constant-time Identification
    Tiplea, Ferucio Laurentiu
    Hristea, Cristian
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 495 - 506
  • [29] On Lions and Elligators: An Efficient Constant-Time Implementation of CSIDH
    Meyer, Michael
    Campos, Fabio
    Reith, Steffen
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 307 - 325
  • [30] More efficient constant time algorithm for computing the Hough transform
    Pan, Yi
    Parallel processing letters, 1994, 4 (1-2) : 45 - 52