Efficient and Constant Time Modular Reduction With Generalized Mersenne Primes

被引:0
|
作者
Erdem, Serdar S. [1 ]
Erdem, Sezer S. [2 ]
机构
[1] Gebze Tech Univ, Dept Elect Engn, TR-41400 Gebze, Kocaeli, Turkiye
[2] Istanbul Univ Cerrahpasa, Vocat Sch Tech Sci, TR-34320 Istanbul, Turkiye
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Software; Cryptography; Software algorithms; Elliptic curves; Elliptic curve cryptography; Arithmetic; Object recognition; Mathematical models; Generalized Mersenne prime; elliptic curve cryptography; modular reduction; SPA;
D O I
10.1109/ACCESS.2024.3514918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many cryptographic applications require a vast number of modular multiplications with a large prime modulus. Generalized Mersennes are a class of primes commonly used in cryptography because of their special forms. When modulus is a generalized Mersenne prime, modular reductions can be calculated efficiently by several additions and subtractions thanks to their special forms. This work modifies the classical reduction algorithms for generalized Mersenne primes in the literature such that the additions and subtractions in these algorithms are performed in parallel from lower digits to higher digits, and the resulting carries and borrows are propagated together. Because calculated values can be negative, two's complement arithmetic is used in calculations. The proposed algorithms have substantial speed improvements over the classical algorithms in software. Also, because reduction modulo an n bit special prime p is performed by a series of n-bit additions and subtractions, a small delta bit overflow may occur in the result such that delta << n . Thus, a final reduction is needed after main reduction. In this work, we prove that the final reduction can be achieved by at most two subtractions where the modulus p >= 2(n)/(1+2(-delta+1)) . And, we show that this lower bound is satisfied by the special primes commonly used in cryptography including the generalized Mersenne primes in practical applications. The proposed modular reduction algorithms handle the final reduction by two subtractions in constant time to avoid timing attacks.
引用
收藏
页码:189307 / 189316
页数:10
相关论文
共 50 条
  • [31] An Efficient Scheme for the Generation of Ordered Trees in Constant Amortized Time
    Parque, Victor
    Miyashita, Tomoyuki
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [32] Area-Time Efficient Realization of Multiple Constant Multiplication
    Lou, Xin
    Yu, Ya Jun
    2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 962 - 965
  • [33] Modular, efficient and constant-memory single-cell RNA-seq preprocessing
    Melsted, Pall
    Booeshaghi, A. Sina
    Liu, Lauren
    Gao, Fan
    Lu, Lambda
    Min, Kyung Hoi
    da Veiga Beltrame, Eduardo
    Hjorleifsson, Kristjan Eldjarn
    Gehring, Jase
    Pachter, Lior
    NATURE BIOTECHNOLOGY, 2021, 39 (07) : 813 - 818
  • [34] Efficient BIKE Hardware Design with Constant-Time Decoder
    Reinders, Andrew H.
    Misoczki, Rafael
    Ghosh, Santosh
    Sastry, Manoj R.
    IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE20), 2020, : 197 - 204
  • [35] Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications
    Deshpande, Sanjay
    del Pozo, Santos Merino
    Mateu, Victor
    Manzano, Marc
    Aaraj, Najwa
    Szefer, Jakub
    2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021), 2021, : 122 - 129
  • [36] Practical Efficient Modular Linear-Time Model-Checking
    Furia, Carlo A.
    Spoletini, Paola
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2008, 5311 : 408 - +
  • [37] Efficient modular reduction algorithm in IFq[x] and its application to "left to right" modular multiplication in IF2[x]
    Dhem, JF
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 203 - 213
  • [38] An efficient construction of secret sharing for generalized adversary structure and its reduction
    Guo, YB
    Shi, TJ
    Ma, HF
    2004 INTERNATIONAL CONFERENCE ON COMMUNICATION, CIRCUITS, AND SYSTEMS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS - VOL 2: SIGNAL PROCESSING, CIRCUITS AND SYSTEMS, 2004, : 6 - 10
  • [39] GENERALIZED DHALQUIST CONSTANT WITH APPLICATION IN STABLE ANALYSIS FOR DYNAMIC SYSTEMS ON TIME SCALES
    Qunli Zhang
    Annals of Differential Equations, 2013, 29 (02) : 248 - 252
  • [40] Lipschitz-continuity of time constant in generalized First-passage percolation
    Can, Van Hao
    Nakajima, Shuta
    Nguyen, Van Quyet
    STOCHASTIC PROCESSES AND THEIR APPLICATIONS, 2024, 175