Analysis of Linear Combination Algorithms in Cryptography

被引:10
|
作者
Grabner, Peter J. [1 ]
Heuberger, Clemens [2 ]
Prodinger, Helmut [3 ,5 ]
Thuswaldner, Joerg M. [4 ]
机构
[1] Graz Univ Technol, Inst Math A, Steyrergasse 30, A-8010 Graz, Austria
[2] Graz Univ Technol, Inst Math B, A-8010 Graz, Austria
[3] Univ Witwatersrand, Johannesburg, South Africa
[4] Univ Leoben, Inst Math & Angew Geometrie, A-8700 Leoben, Austria
[5] Stellenbosch Univ, Dept Math, ZA-7602 Stellenbosch, South Africa
基金
新加坡国家研究基金会; 奥地利科学基金会;
关键词
Hamming weight; digital expansions; online algorithm; elliptic curve; cryptosystems;
D O I
10.1145/1077464.1077473
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Several cryptosystems rely on fast calculations of linear combinations in groups. One way to achieve this is to use joint signed binary digit expansions of small "weight." We study two algorithms, one based on nonadjacent forms of the coefficients of the linear combination, the other based on a certain joint sparse form specifically adapted to this problem. Both methods are sped up using the sliding windows approach combined with precomputed lookup tables. We give explicit and asymptotic results for the number of group operations needed, assuming uniform distribution of the coefficients. Expected values, variances and a central limit theorem are proved using generating functions. Furthermore, we provide a new algorithm that calculates the digits of an optimal expansion of pairs of integers from left to right. This avoids storing the whole expansion, which is needed with the previously known right-to -left methods, and allows an online computation.
引用
收藏
页码:123 / 142
页数:20
相关论文
共 50 条
  • [1] APPLICATION OF LAPLACE TRANSFORM TO CRYPTOGRAPHY USING LINEAR COMBINATION OF FUNCTIONS
    Adeyefa, E.
    Akinola, L.
    Agbolade, O.
    TWMS JOURNAL OF APPLIED AND ENGINEERING MATHEMATICS, 2021, 11 (04): : 1050 - 1060
  • [2] Analysis of Cryptography Algorithms Implemented in Android Mobile Application
    Salkanovic, Alen
    Ljubic, Sandi
    Stankovic, Ljubisa
    Lerga, Jonatan
    INFORMATION TECHNOLOGY AND CONTROL, 2021, 50 (04): : 786 - 807
  • [3] Comparative Analysis of Lightweight Cryptography Algorithms for Smart Grids
    Kaur, Sumandeep
    Kaur, Supreet
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 564 - 567
  • [4] From algorithms to cryptography
    Luccio, F
    Pagli, L
    LATIN 2002: THEORETICAL INFORMATICS, 2002, 2286 : 15 - 15
  • [5] Cryptography: Algorithms and standards
    Desoky, A
    2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2, 2005, : 924 - 929
  • [6] Cryptography with Streaming Algorithms
    Papakonstantinou, Periklis A.
    Yang, Guang
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 55 - 70
  • [7] Study of Vulnerabilities in the Cryptography Algorithms
    Ahuja, Harjis
    Bapna, Ruchita
    Bhase, Gargee
    Shekokar, Narendra
    PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 65 - 76
  • [8] Application of Genetics Algorithms in Cryptography
    Pekarcik, Peter
    Chovancova, Eva
    Chovanec, Martin
    Stancel, Martin
    28TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS, INES 2024, 2024, : 181 - 186
  • [9] Linear analysis of genetic algorithms
    Schmitt, LM
    Nehaniv, CL
    Fujii, RH
    THEORETICAL COMPUTER SCIENCE, 1998, 200 (1-2) : 101 - 134
  • [10] Comparative Performance Analysis of Lightweight Cryptography Algorithms for IoT Sensor Nodes
    Fotovvat, Amir
    Rahman, Gazi M. E.
    Vedaei, Seyed Shahim
    Wahid, Khan A.
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (10) : 8279 - 8290