Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Information Technology Journal
  Year: 2013 | Volume: 12 | Issue: 9 | Page No.: 1780-1787
DOI: 10.3923/itj.2013.1780.1787
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Hastening Point Multiplication in the ECC

Ahmed Chalak Shakir, Jia Min and Gu Xuemai

Abstract:
The demanding of the lightweight algorithms to produce efficient techniques used for security, is paving the way toward the exploiting of elliptic curve for cryptography. Therefore, there has a trend for substituting the traditional public key cryptography by the Elliptic Curve Cryptography (ECC) due to its efficiency for providing a high security with smaller keys in the comparison with other algorithms. The main problem in elliptic curve cryptography is the complexity of executing the operation of multiplying a point on the elliptic curve by the scalar value which is mainly fulfilled by the doubling and addition operations and is called scalar multiplication or point multiplication. This scalar can be represented by zeros and ones in terms of binary system. In double-and-add method, the number of ones (hamming weight) determines the number of addition operations, while the number of bits that represents the scalar determines the number of doubling operations. This paper produces the encoding method for reducing the hamming weight of the scalar and thereby diminishing the complexity of the scalar multiplication. The proposed method is compared with the one’s complement method and the simulation analysis showed that it gives lower hamming weight than the one’s complement method.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes
  •    Elliptic Curve Cryptography over Binary Finite Field GF(2m)
  •    Off-Line Jawi Handwriting Recognition using Hamming Classification
How to cite this article:

Ahmed Chalak Shakir, Jia Min and Gu Xuemai, 2013. Hastening Point Multiplication in the ECC. Information Technology Journal, 12: 1780-1787.

DOI: 10.3923/itj.2013.1780.1787

URL: https://scialert.net/abstract/?doi=itj.2013.1780.1787

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

Curve Bottom