Efficient and Constant Time Modular Reduction With Generalized Mersenne Primes

被引:0
|
作者
Erdem, Serdar S. [1 ]
Erdem, Sezer S. [2 ]
机构
[1] Gebze Tech Univ, Dept Elect Engn, TR-41400 Gebze, Kocaeli, Turkiye
[2] Istanbul Univ Cerrahpasa, Vocat Sch Tech Sci, TR-34320 Istanbul, Turkiye
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Software; Cryptography; Software algorithms; Elliptic curves; Elliptic curve cryptography; Arithmetic; Object recognition; Mathematical models; Generalized Mersenne prime; elliptic curve cryptography; modular reduction; SPA;
D O I
10.1109/ACCESS.2024.3514918
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many cryptographic applications require a vast number of modular multiplications with a large prime modulus. Generalized Mersennes are a class of primes commonly used in cryptography because of their special forms. When modulus is a generalized Mersenne prime, modular reductions can be calculated efficiently by several additions and subtractions thanks to their special forms. This work modifies the classical reduction algorithms for generalized Mersenne primes in the literature such that the additions and subtractions in these algorithms are performed in parallel from lower digits to higher digits, and the resulting carries and borrows are propagated together. Because calculated values can be negative, two's complement arithmetic is used in calculations. The proposed algorithms have substantial speed improvements over the classical algorithms in software. Also, because reduction modulo an n bit special prime p is performed by a series of n-bit additions and subtractions, a small delta bit overflow may occur in the result such that delta << n . Thus, a final reduction is needed after main reduction. In this work, we prove that the final reduction can be achieved by at most two subtractions where the modulus p >= 2(n)/(1+2(-delta+1)) . And, we show that this lower bound is satisfied by the special primes commonly used in cryptography including the generalized Mersenne primes in practical applications. The proposed modular reduction algorithms handle the final reduction by two subtractions in constant time to avoid timing attacks.
引用
收藏
页码:189307 / 189316
页数:10
相关论文
共 50 条
  • [41] A Digital Root Based Modular Reduction Technique for Power Efficient, Fault Tolerance in FPGAs
    Dorrance, Richard
    Belogolovy, Andrey
    Wang, Hechen
    Zhang, Xue
    2020 30TH INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL), 2020, : 341 - 346
  • [42] Efficient estimation for time series following generalized linear models
    Thomson, T.
    Hossain, S.
    Ghahramani, M.
    AUSTRALIAN & NEW ZEALAND JOURNAL OF STATISTICS, 2016, 58 (04) : 493 - 513
  • [43] Efficient Constant-time Entropy Decoding for H.264
    Iqbal, Nabeel
    Henkel, Joerg
    DATE: 2009 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, VOLS 1-3, 2009, : 1440 - 1445
  • [44] Space Efficient Hash Tables with Worst Case Constant Access Time
    Dimitris Fotakis
    Rasmus Pagh
    Peter Sanders
    Paul Spirakis
    Theory of Computing Systems, 2005, 38 : 229 - 248
  • [45] Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time
    Micciancio, Daniele
    Walter, Michael
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 455 - 485
  • [46] Space efficient hash tables with worst case constant access time
    Fotakis, D
    Pagh, R
    Sanders, P
    Spirakis, P
    STACS 2003, PROCEEDINGS, 2003, 2607 : 271 - 282
  • [47] An Efficient Approach to Multiphase Constant On-Time Buck Converter Simulation
    Lu, Xianting
    Yin, Xunzhao
    Zhuo, Cheng
    2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, : 143 - 148
  • [48] An Efficient Speech Compression Technique in Time Domain with Nearly Constant Compression
    Hore, Ayan
    Jain, Pratik
    Chakraborty, Debashis
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 15 - 22
  • [49] Constant gradient FEXSY: A time-efficient method for measuring exchange
    Scher, Yuval
    Reuveni, Shlomi
    Cohen, Yoram
    JOURNAL OF MAGNETIC RESONANCE, 2020, 311
  • [50] Space efficient hash tables with worst case constant access time
    Fotakis, DT
    Pagh, R
    Sanders, P
    Spirakis, P
    THEORY OF COMPUTING SYSTEMS, 2005, 38 (02) : 229 - 248