SlideShare a Scribd company logo
1 of 6
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 4 || Issue || 4 || Pages || PP.45-50 || 2015 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 45
An Efficient Elliptic Curve Cryptography Arithmetic Using
Nikhilam Multiplication
1,
Prokash Barman, 2,
Banani Saha
1, 2,
Department of Computer Science & Engineering, University of Calcutta
Kolkata, India
-------------------------------------------------------------ABSTRACT-----------------------------------------------------------
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC)
arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher
order classical (standard) multiplication many intermediate operations are required. Reduced operation in
multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient
multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic
mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The
Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional
speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication.
KEYWORDS - Elliptic Curve Cryptography, Nikhilam Sutra, Vedic Mathematics, Karatsuba algorithm,
scalar multiplication, Vedic mathematics, ECC arithmetic.
-------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 02-February-2015 Date of Accepted: 15-April-2015
-------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cryptography is a technique of making message secure or secret. Sensitive information can stored or
transmitted across secure or insecure network with secure or secret message transmission method. So that an
unauthorised person can’t access the secret message. One of the best public key cryptographic methods to secure
message is Elliptic Curve Cryptography. In this cryptographic method, major time consuming operations are (1)
Point Addition and (2) Point Doubling which needs scalar (integer) multiplication.
Generally, multiplication uses standard or classical method. But classical method to multiply two n-bit
integer requires n2
operations [5]. Karatsuba method of multiplication uses divide-and-conquer technique to
multiply two n-bit integers in nlog
3 operations [5]. But for small inputs Karatsuba algorithm works slower than
the classical multiplication algorithm because of recursive operational overhead. To overcome this problem we
use Nikhilam Sutra of Vedic Mathematics. This Nikhilam Sutra (algorithm) performs large integer multiplication
by converting it into small integer multiplication along with some addition and shift operation.
This paper is organised in the following sections. Section II describes Elliptic Curve Cryptography
Arithmetic along with some conventional scalar multiplication methods. Nikhilam Navatascharamam Deshatah
(Nikhilam Sutra) have been discussed in section III. The use of Nikhilam Sutra in ECC is depicted in section IV.
Section V conclusion is described.
II. ELLIPTIC CURVE CRYPTOGRAPHY ARITHMETIC
An Elliptic Curve is defined as an equation having set of solution with the point at infinity. The elliptic
y2
+xy=x3
+ax+b in GF(2m) and y2
=x3
+ax+b in GM(P) are called weierstrass equations. Variables and
coefficients are chosen from a large finite field. These points form a group. The group operation for elliptic
curve cryptography are point multiplication, point addition and point doubling. Elliptic Curve Point
Multiplication is the operation of successively adding a point along an elliptic curve to itself repeatedly- which is
called as “Elliptic Curve Scalar Multiplication” [6]. The operation denoted as
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 46
nP = P + P + P + P + . . . . . . . . . . . . + P for some scalar (integer) n and a point P(x,y) that lies on the
curve E: y2
=x3
+ax+b (Weirerstrass Curve). The security of Elliptic Curve Cryptography depends on the
intractability of determining n from Q=nP, given known value of Q and P. It is known as Elliptic Curve discrete
logarithm problem.
Point addition
Point addition [7] is defined as taking two points along a curve E and computing where a line through
them intersects the curve. The negative of the intersection point is used as the result of the addition.
ECC Point addition
The operation is denoted as P + Q = R or (Xp , Yp) + (Xq , Yq) = (Xr , Yr). This can be algebraically
calculated by :
Note that we assume the elliptic field is given by
Point Doubling
Point doubling [7] is similar to point addition, except one takes the tangent of a single point and finds
the intersection with the tangent line.
ECC Point Doubling
The operation is denoted as 2J=L or (Xp , Yp) + (Xp , Yp) = (Xr , Yr). This can be algebraically
calculated by :
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 47
Where a is the multiplication factor of X in the elliptic field given by .
Point multiplication [7] :
The straight forward way of computing a point multiplication is through repeated addition. However, this is a
fully exponential way to computing the multiplication. The multiplication method is as follows
Double and add:
To compute the double dP of a point P, start with the binary representation of d
d = d0 + 2d1 + 22
d2 + 23
d3 + - - - - - - - - - 2m
dm
where [d0 - - - - - dm] Σ {1, 0}
Algorithm:
Input : P, m
Output: Q
Q=0
For i from m to 0 do
Q=2Q (using point doubling)
If di = 1 then Q = Q + P (using point addition)
Return Q
An alternative way of the above may also be derived using recursive function
Algorithm:
Input:
Output: P + ,
is
if n = 0 then return 0
else if n mod 2=1 then
P + [addition if n is odd]
else [doubling if n is even]
Here the function for doubling, P is the coordinate to double, n is the number of times to double the
coordinate.
Example:
100P = = 2 ( 2 ( P + 2 ( 2 ( 2 ( P + 2P) ) ) ) )
This algorithm requires Log2 (n) iteration of point doubling and addition to compute the full point multiplication.
There are many variations of this algorithm such as window, sliding window, NAF, NAF-W, vector chains and
Montogomery ladder which are beyond our current discussion.
III. NIKHILAM NAVATASCHARAMAM DESHATAH (NIKHILAM SUTRA) MULTIPLICATION
One of the 16 Sutras of Vedic Mathematics is Nikhilam Sutra. It can be used to convert large digits multiplication
to small digits multiplication with the help of few extra add, subtract and shift operations [5]. In some cases two-digit
multiplication can be performed using only one digit multiplication instead of 3 one digit multiplication required with
Karatsuba algorithm. The Vedic formula under consideration is Nikhilam Navatascharamam Deshatah [1], which means all
from 9 and last from 10. The mathematical derivation of the algorithm is given as follows.
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 48
Consider 98 X 97
Nearest base = 100
98 (100-98)
97 (100-97)
98 2
97 3
95 06
Result = 98 X 97 = 9506
Figure 1: Multiplication using Nikhilam Sutra
With the help of Nikhilam Sutra two three digit multiplication can be performed with only one multiplication
along with some addition and shift operations as shown in the table below
Table-I
Multiplication of 107 * 109
Integer Base Difference
Multiplicand 107 (100-107)= -7
Multiplier 109 (100-109)= - 9
Computation (107-(-9))=(109-(-7))=116 (-7)*(-9)=63
116 63
Result 11663
For the above multiplication in standard method 9 multiplication is required and in Karatsuba algorithm 4
multiplication is required. The principle behind the Nikhilam Sutra is as follows:
Let the Multiplicand, m=x+a
Multiplier, n=x+b
where, x is the nearest base, then m*n= (x+a)*(x+b)=x(x+a+b) + ab
IV. USE OF NIKHILAM MULTIPLICATION IN ECC SCALAR MULTIPLICATION
The point multiplication in ECC is basically includes Point doubling and Point addition operations as described in
section II. These operations need scalar (integer) multiplication of large magnitude. In standard multiplication and Karatsuba
multiplication method n2
and nlog
3 operations required to multiply two n digits numbers. Whereas the Nikhilam method
require less multiplication operational steps. The use of Nikhlam method of multiplication in ECC scalar multiplication will
increase the overall speed of Elliptic Curve Cryptography operation.
The use of scalar multiplication in ECC arithmetic is done in (1) Point Doubling and (2) Point Addition in
the following cases
Point Doubling:
Left part of product Right part of product
Cross subtract right part of
product from any of left part of
the product i.e. 98-3=97-2=95
Result=Nearest Base X Computed Left Part+ Computed Right
Part. i.e. 100 X 95 + 06 = 9506
Subtract the multiplicand from nearest base
Subtract the multiplier from nearest base
Calculate the multiplication
result of right part of the product
i.e. 2 X 3 = 06
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 49
Point addition
The actual scalar (integer) multiplication in ECC [7] is shown in the figures. In some cases squaring is
also done with the nikhilam method.
V. PROPOSED WORK
As Nikhilam multiplication needs less operational steps compared to other conventional multiplication
methods, it is assumed that our proposed method of using nikhilam method in Point addition and Point doubling
of ECC arithmetic will increase the operational speed also. To use the nikhilam multiplier in ECC we propose
Binary Multiplication using Nikhilam method.
We can perform binary digit multiplication using Nikhilam sutra by converting n-bit multiplication to (n
- 1)-bit multiplication and some additional add/subtract and shift operation. We can apply this conversion
repeatedly until we get trivial multiplicand/multiplier or 1-bit multiplication. We can also put some threshold
limit m where 1 < m < n up to which we would like to do this conversion.
2-bit multiplication can be performed using single 1-bit multiplication. For example if we have to multiply
11X11. Here multiplicand M = 11, and multiplier N = 11. We can proceed as follows:
1. Compute A = 11 - 10; Subtract the multiplicand from nearest base
2. Compute B = 11-10; Subtract the multiplier from the same base
3. Compute C = B * A = 1 * 1 = 1
4. Compute D = M + B = N + A = 11 + 1 = 100
5. Result 10 * D + C = 1001
The only multiplication required in this computation (Table II) is for C in step 3.
TABLE II
BINARY MULTIPLICATION OF 11*11
Bits Base Difference
Multiplicand 11 (11-10)=1
Multiplier 11 (11-10)=1
(11+1)=100 (1*1)=1
Result 1001
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 50
For 3-bit multiplication consider the example of 101 * 110
1. Compute A = 101*100; Subtract the multiplicand from nearest base
2. Compute B = 110 * 100; Subtract the multiplier from the same base
3. Compute C = 10 *1 = 10
4. Compute D = M + B = N + A = 101 + 10 = 111
5. Result 100 * D + C = 11110
TABLE III
BINARY MULTIPLICATION OF 101*110
Bits Base Difference
Multiplicand 101 (101-100)=1
Multiplier 110 (110-100)=10
(101+10)=111 (10*1)=10
Result 11110
In this computation also two 1-bit multiplication is performed. While in case of standard multiplication 9
multiplication is required, and Karatsuba algorithm use 4 multiplication.
I. CONCLUSION
From the proposed binary multiplication method we can see that the Nikhilam multiplier uses less
operational steps than the standard multiplier and other multiplier like Karatsuba algorithm. So it is found to be
efficient in view of less operational steps and smaller multiplications. Hence the proposed binary multiplication
method may be used in ECC efficiently. We are planning the hardware implementation of Elliptic Curve
Cryptography system using binary Nikhilam multiplier embedded in FPGA.
REFERENCES
[1] Jagadguru Swami Sri Bharath Krishna Tirthaji, “Vedic Mathematics or Sixteen Simple Sutras from Vedas”, Motilal Bhandaridas,
Varanasi (India), 1986.
[2] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C” – Second Edition.
[3] Mr. Dharmendra Madke, Prof. Sameena Zafar, “Polynomial Multiplication Using Karatsuba and Nikhilam Sutra”- International
Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol-4, Issue-6, June-2014, pp. 1423-
1428.
[4] Prokash Barman, Dr. Banani Saha, “E-Governance Security using Public Key Cryptography with special focus on ECC” –
International Journal of Engineering Science Invention (IJESI), Vol-2, Issue-8, August 2013, pp. 10-16.
[5] Shri Prakash Dwivedi, “An Efficient Multiplication Algorithm Using Nikhilam Method”- arXiv:1307.2735v1 [cs.DS] 10 Jul 2013
[6] Krzysztof Jankowski, Pierre Laurent, Aidan O’Mahony, “Intel Polynomial Multiplication Instruction and its Usage for Elliptic
Curve Cryptography” –White paper, April 2012
[7] Wikipedia, http://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication - accessed on 17-09-2014

More Related Content

What's hot

Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
GCD of n Numbers
GCD of n NumbersGCD of n Numbers
GCD of n NumbersSaikat Roy
 
Optimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data PerspectiveOptimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data Perspectiveপল্লব রায়
 
dynamic programming Rod cutting class
dynamic programming Rod cutting classdynamic programming Rod cutting class
dynamic programming Rod cutting classgiridaroori
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communicationsDeepshika Reddy
 
Stock price prediction regression nn
Stock price prediction   regression nnStock price prediction   regression nn
Stock price prediction regression nnZanshila Rodrigues
 
Design of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueDesign of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueKumar Goud
 
Greatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 YearsGreatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 Yearssixtyone
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)VARUN KUMAR
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slidesSHAMJITH KM
 
Global optimization
Global optimizationGlobal optimization
Global optimizationbpenalver
 
lecture 15
lecture 15lecture 15
lecture 15sajinsc
 
Minimization of Assignment Problems
Minimization of Assignment ProblemsMinimization of Assignment Problems
Minimization of Assignment Problemsijtsrd
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplicationKumar
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyDerek Callaway
 
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesAtomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesIJERA Editor
 

What's hot (20)

Topic 1.2
Topic 1.2Topic 1.2
Topic 1.2
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
GCD of n Numbers
GCD of n NumbersGCD of n Numbers
GCD of n Numbers
 
Optimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data PerspectiveOptimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data Perspective
 
dynamic programming Rod cutting class
dynamic programming Rod cutting classdynamic programming Rod cutting class
dynamic programming Rod cutting class
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communications
 
Stock price prediction regression nn
Stock price prediction   regression nnStock price prediction   regression nn
Stock price prediction regression nn
 
Unit 2
Unit 2Unit 2
Unit 2
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
Design of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueDesign of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition Technique
 
Greatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 YearsGreatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 Years
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slides
 
Global optimization
Global optimizationGlobal optimization
Global optimization
 
lecture 15
lecture 15lecture 15
lecture 15
 
Minimization of Assignment Problems
Minimization of Assignment ProblemsMinimization of Assignment Problems
Minimization of Assignment Problems
 
Business Logistics Assignment Help
Business Logistics Assignment HelpBusiness Logistics Assignment Help
Business Logistics Assignment Help
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplication
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
 
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesAtomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
 

Viewers also liked

Application of Coconut Coir and Fly ash in Sub grade strengthening
Application of Coconut Coir and Fly ash in Sub grade strengtheningApplication of Coconut Coir and Fly ash in Sub grade strengthening
Application of Coconut Coir and Fly ash in Sub grade strengtheningtheijes
 
On the Construction of Cantor like Sets
On the Construction of Cantor like SetsOn the Construction of Cantor like Sets
On the Construction of Cantor like Setstheijes
 
Zigbee based weather monitoring system
Zigbee based weather monitoring systemZigbee based weather monitoring system
Zigbee based weather monitoring systemtheijes
 
Recent Developments in Organic Polymers Based- Photovoltaic Cells
Recent Developments in Organic Polymers Based- Photovoltaic CellsRecent Developments in Organic Polymers Based- Photovoltaic Cells
Recent Developments in Organic Polymers Based- Photovoltaic Cellstheijes
 
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...theijes
 
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...Inclusive On-line Learning Environments. New Approaches and Possible Applicab...
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...theijes
 
Natural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing SchemeNatural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing Schemetheijes
 
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...theijes
 
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...theijes
 
First mitotic division: criterion for selection of potential IVF embryo – A S...
First mitotic division: criterion for selection of potential IVF embryo – A S...First mitotic division: criterion for selection of potential IVF embryo – A S...
First mitotic division: criterion for selection of potential IVF embryo – A S...theijes
 
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping Systems
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping SystemsOptimum Operation of Direct Coupled Photovoltaic-Water Pumping Systems
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping Systemstheijes
 
Study, testing & analysis of composit material based on munja fibre
Study, testing & analysis of composit material based on munja fibreStudy, testing & analysis of composit material based on munja fibre
Study, testing & analysis of composit material based on munja fibretheijes
 
Study on the Effect of Ggbs & M Sand in Self Compacting oncrete
Study on the Effect of Ggbs & M Sand in Self Compacting oncreteStudy on the Effect of Ggbs & M Sand in Self Compacting oncrete
Study on the Effect of Ggbs & M Sand in Self Compacting oncretetheijes
 
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...theijes
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...theijes
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentialitytheijes
 
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...theijes
 
Impact on Aquatic Environment for Water Pollution in the Vahirab River
Impact on Aquatic Environment for Water Pollution in the Vahirab RiverImpact on Aquatic Environment for Water Pollution in the Vahirab River
Impact on Aquatic Environment for Water Pollution in the Vahirab Rivertheijes
 

Viewers also liked (19)

Application of Coconut Coir and Fly ash in Sub grade strengthening
Application of Coconut Coir and Fly ash in Sub grade strengtheningApplication of Coconut Coir and Fly ash in Sub grade strengthening
Application of Coconut Coir and Fly ash in Sub grade strengthening
 
On the Construction of Cantor like Sets
On the Construction of Cantor like SetsOn the Construction of Cantor like Sets
On the Construction of Cantor like Sets
 
Zigbee based weather monitoring system
Zigbee based weather monitoring systemZigbee based weather monitoring system
Zigbee based weather monitoring system
 
Recent Developments in Organic Polymers Based- Photovoltaic Cells
Recent Developments in Organic Polymers Based- Photovoltaic CellsRecent Developments in Organic Polymers Based- Photovoltaic Cells
Recent Developments in Organic Polymers Based- Photovoltaic Cells
 
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...
Effects of Variable Viscosity and Thermal Conductivity on MHD free Convection...
 
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...Inclusive On-line Learning Environments. New Approaches and Possible Applicab...
Inclusive On-line Learning Environments. New Approaches and Possible Applicab...
 
Natural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing SchemeNatural Image Based Visual Secret Sharing Scheme
Natural Image Based Visual Secret Sharing Scheme
 
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...
The Correlation of Parcel shape and Dimensions with Regulation in Creating Co...
 
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...
Evaluation of Heterogeneous Aquifers in Crystalline Rocks from Resistivity So...
 
First mitotic division: criterion for selection of potential IVF embryo – A S...
First mitotic division: criterion for selection of potential IVF embryo – A S...First mitotic division: criterion for selection of potential IVF embryo – A S...
First mitotic division: criterion for selection of potential IVF embryo – A S...
 
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping Systems
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping SystemsOptimum Operation of Direct Coupled Photovoltaic-Water Pumping Systems
Optimum Operation of Direct Coupled Photovoltaic-Water Pumping Systems
 
Study, testing & analysis of composit material based on munja fibre
Study, testing & analysis of composit material based on munja fibreStudy, testing & analysis of composit material based on munja fibre
Study, testing & analysis of composit material based on munja fibre
 
Study on the Effect of Ggbs & M Sand in Self Compacting oncrete
Study on the Effect of Ggbs & M Sand in Self Compacting oncreteStudy on the Effect of Ggbs & M Sand in Self Compacting oncrete
Study on the Effect of Ggbs & M Sand in Self Compacting oncrete
 
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...
In-vitro Interaction of αB-Crystallin on Serum Amyloid A and Serum Amyloid A ...
 
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...
Temperature Dependence of Density and Dynamic Surface Tension of Groundnut Oi...
 
Trusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data ConfidentialityTrusted Hardware Database With Privacy And Data Confidentiality
Trusted Hardware Database With Privacy And Data Confidentiality
 
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
Discovery of Perched Aquifer When Assessing Aquifer Potential along the flood...
 
Impact on Aquatic Environment for Water Pollution in the Vahirab River
Impact on Aquatic Environment for Water Pollution in the Vahirab RiverImpact on Aquatic Environment for Water Pollution in the Vahirab River
Impact on Aquatic Environment for Water Pollution in the Vahirab River
 

Similar to An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Karatsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationKaratsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationAtul Singh
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPERRaj kumar
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...TELKOMNIKA JOURNAL
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfRajJain516913
 
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...idescitation
 
IRJET- Solving Quadratic Equations using C++ Application Program
IRJET-  	  Solving Quadratic Equations using C++ Application ProgramIRJET-  	  Solving Quadratic Equations using C++ Application Program
IRJET- Solving Quadratic Equations using C++ Application ProgramIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
High Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsHigh Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsIOSR Journals
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docxbobbywlane695641
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docxgalerussel59292
 
COA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxCOA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxMala Gowda
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Pramit Kumar
 

Similar to An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Karatsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationKaratsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplication
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPER
 
F044033742
F044033742F044033742
F044033742
 
Subquad multi ff
Subquad multi ffSubquad multi ff
Subquad multi ff
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
 
IRJET- Solving Quadratic Equations using C++ Application Program
IRJET-  	  Solving Quadratic Equations using C++ Application ProgramIRJET-  	  Solving Quadratic Equations using C++ Application Program
IRJET- Solving Quadratic Equations using C++ Application Program
 
A045030105
A045030105A045030105
A045030105
 
A045030105
A045030105A045030105
A045030105
 
Vedic multiplier
Vedic multiplierVedic multiplier
Vedic multiplier
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
High Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsHigh Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing Applications
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docx
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docx
 
COA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxCOA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptx
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)
 
I43024751
I43024751I43024751
I43024751
 
Lecture 7.pptx
Lecture 7.pptxLecture 7.pptx
Lecture 7.pptx
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 4 || Issue || 4 || Pages || PP.45-50 || 2015 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 45 An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication 1, Prokash Barman, 2, Banani Saha 1, 2, Department of Computer Science & Engineering, University of Calcutta Kolkata, India -------------------------------------------------------------ABSTRACT----------------------------------------------------------- Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication. KEYWORDS - Elliptic Curve Cryptography, Nikhilam Sutra, Vedic Mathematics, Karatsuba algorithm, scalar multiplication, Vedic mathematics, ECC arithmetic. ------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 02-February-2015 Date of Accepted: 15-April-2015 ------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cryptography is a technique of making message secure or secret. Sensitive information can stored or transmitted across secure or insecure network with secure or secret message transmission method. So that an unauthorised person can’t access the secret message. One of the best public key cryptographic methods to secure message is Elliptic Curve Cryptography. In this cryptographic method, major time consuming operations are (1) Point Addition and (2) Point Doubling which needs scalar (integer) multiplication. Generally, multiplication uses standard or classical method. But classical method to multiply two n-bit integer requires n2 operations [5]. Karatsuba method of multiplication uses divide-and-conquer technique to multiply two n-bit integers in nlog 3 operations [5]. But for small inputs Karatsuba algorithm works slower than the classical multiplication algorithm because of recursive operational overhead. To overcome this problem we use Nikhilam Sutra of Vedic Mathematics. This Nikhilam Sutra (algorithm) performs large integer multiplication by converting it into small integer multiplication along with some addition and shift operation. This paper is organised in the following sections. Section II describes Elliptic Curve Cryptography Arithmetic along with some conventional scalar multiplication methods. Nikhilam Navatascharamam Deshatah (Nikhilam Sutra) have been discussed in section III. The use of Nikhilam Sutra in ECC is depicted in section IV. Section V conclusion is described. II. ELLIPTIC CURVE CRYPTOGRAPHY ARITHMETIC An Elliptic Curve is defined as an equation having set of solution with the point at infinity. The elliptic y2 +xy=x3 +ax+b in GF(2m) and y2 =x3 +ax+b in GM(P) are called weierstrass equations. Variables and coefficients are chosen from a large finite field. These points form a group. The group operation for elliptic curve cryptography are point multiplication, point addition and point doubling. Elliptic Curve Point Multiplication is the operation of successively adding a point along an elliptic curve to itself repeatedly- which is called as “Elliptic Curve Scalar Multiplication” [6]. The operation denoted as
  • 2. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 46 nP = P + P + P + P + . . . . . . . . . . . . + P for some scalar (integer) n and a point P(x,y) that lies on the curve E: y2 =x3 +ax+b (Weirerstrass Curve). The security of Elliptic Curve Cryptography depends on the intractability of determining n from Q=nP, given known value of Q and P. It is known as Elliptic Curve discrete logarithm problem. Point addition Point addition [7] is defined as taking two points along a curve E and computing where a line through them intersects the curve. The negative of the intersection point is used as the result of the addition. ECC Point addition The operation is denoted as P + Q = R or (Xp , Yp) + (Xq , Yq) = (Xr , Yr). This can be algebraically calculated by : Note that we assume the elliptic field is given by Point Doubling Point doubling [7] is similar to point addition, except one takes the tangent of a single point and finds the intersection with the tangent line. ECC Point Doubling The operation is denoted as 2J=L or (Xp , Yp) + (Xp , Yp) = (Xr , Yr). This can be algebraically calculated by :
  • 3. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 47 Where a is the multiplication factor of X in the elliptic field given by . Point multiplication [7] : The straight forward way of computing a point multiplication is through repeated addition. However, this is a fully exponential way to computing the multiplication. The multiplication method is as follows Double and add: To compute the double dP of a point P, start with the binary representation of d d = d0 + 2d1 + 22 d2 + 23 d3 + - - - - - - - - - 2m dm where [d0 - - - - - dm] Σ {1, 0} Algorithm: Input : P, m Output: Q Q=0 For i from m to 0 do Q=2Q (using point doubling) If di = 1 then Q = Q + P (using point addition) Return Q An alternative way of the above may also be derived using recursive function Algorithm: Input: Output: P + , is if n = 0 then return 0 else if n mod 2=1 then P + [addition if n is odd] else [doubling if n is even] Here the function for doubling, P is the coordinate to double, n is the number of times to double the coordinate. Example: 100P = = 2 ( 2 ( P + 2 ( 2 ( 2 ( P + 2P) ) ) ) ) This algorithm requires Log2 (n) iteration of point doubling and addition to compute the full point multiplication. There are many variations of this algorithm such as window, sliding window, NAF, NAF-W, vector chains and Montogomery ladder which are beyond our current discussion. III. NIKHILAM NAVATASCHARAMAM DESHATAH (NIKHILAM SUTRA) MULTIPLICATION One of the 16 Sutras of Vedic Mathematics is Nikhilam Sutra. It can be used to convert large digits multiplication to small digits multiplication with the help of few extra add, subtract and shift operations [5]. In some cases two-digit multiplication can be performed using only one digit multiplication instead of 3 one digit multiplication required with Karatsuba algorithm. The Vedic formula under consideration is Nikhilam Navatascharamam Deshatah [1], which means all from 9 and last from 10. The mathematical derivation of the algorithm is given as follows.
  • 4. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 48 Consider 98 X 97 Nearest base = 100 98 (100-98) 97 (100-97) 98 2 97 3 95 06 Result = 98 X 97 = 9506 Figure 1: Multiplication using Nikhilam Sutra With the help of Nikhilam Sutra two three digit multiplication can be performed with only one multiplication along with some addition and shift operations as shown in the table below Table-I Multiplication of 107 * 109 Integer Base Difference Multiplicand 107 (100-107)= -7 Multiplier 109 (100-109)= - 9 Computation (107-(-9))=(109-(-7))=116 (-7)*(-9)=63 116 63 Result 11663 For the above multiplication in standard method 9 multiplication is required and in Karatsuba algorithm 4 multiplication is required. The principle behind the Nikhilam Sutra is as follows: Let the Multiplicand, m=x+a Multiplier, n=x+b where, x is the nearest base, then m*n= (x+a)*(x+b)=x(x+a+b) + ab IV. USE OF NIKHILAM MULTIPLICATION IN ECC SCALAR MULTIPLICATION The point multiplication in ECC is basically includes Point doubling and Point addition operations as described in section II. These operations need scalar (integer) multiplication of large magnitude. In standard multiplication and Karatsuba multiplication method n2 and nlog 3 operations required to multiply two n digits numbers. Whereas the Nikhilam method require less multiplication operational steps. The use of Nikhlam method of multiplication in ECC scalar multiplication will increase the overall speed of Elliptic Curve Cryptography operation. The use of scalar multiplication in ECC arithmetic is done in (1) Point Doubling and (2) Point Addition in the following cases Point Doubling: Left part of product Right part of product Cross subtract right part of product from any of left part of the product i.e. 98-3=97-2=95 Result=Nearest Base X Computed Left Part+ Computed Right Part. i.e. 100 X 95 + 06 = 9506 Subtract the multiplicand from nearest base Subtract the multiplier from nearest base Calculate the multiplication result of right part of the product i.e. 2 X 3 = 06
  • 5. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 49 Point addition The actual scalar (integer) multiplication in ECC [7] is shown in the figures. In some cases squaring is also done with the nikhilam method. V. PROPOSED WORK As Nikhilam multiplication needs less operational steps compared to other conventional multiplication methods, it is assumed that our proposed method of using nikhilam method in Point addition and Point doubling of ECC arithmetic will increase the operational speed also. To use the nikhilam multiplier in ECC we propose Binary Multiplication using Nikhilam method. We can perform binary digit multiplication using Nikhilam sutra by converting n-bit multiplication to (n - 1)-bit multiplication and some additional add/subtract and shift operation. We can apply this conversion repeatedly until we get trivial multiplicand/multiplier or 1-bit multiplication. We can also put some threshold limit m where 1 < m < n up to which we would like to do this conversion. 2-bit multiplication can be performed using single 1-bit multiplication. For example if we have to multiply 11X11. Here multiplicand M = 11, and multiplier N = 11. We can proceed as follows: 1. Compute A = 11 - 10; Subtract the multiplicand from nearest base 2. Compute B = 11-10; Subtract the multiplier from the same base 3. Compute C = B * A = 1 * 1 = 1 4. Compute D = M + B = N + A = 11 + 1 = 100 5. Result 10 * D + C = 1001 The only multiplication required in this computation (Table II) is for C in step 3. TABLE II BINARY MULTIPLICATION OF 11*11 Bits Base Difference Multiplicand 11 (11-10)=1 Multiplier 11 (11-10)=1 (11+1)=100 (1*1)=1 Result 1001
  • 6. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 50 For 3-bit multiplication consider the example of 101 * 110 1. Compute A = 101*100; Subtract the multiplicand from nearest base 2. Compute B = 110 * 100; Subtract the multiplier from the same base 3. Compute C = 10 *1 = 10 4. Compute D = M + B = N + A = 101 + 10 = 111 5. Result 100 * D + C = 11110 TABLE III BINARY MULTIPLICATION OF 101*110 Bits Base Difference Multiplicand 101 (101-100)=1 Multiplier 110 (110-100)=10 (101+10)=111 (10*1)=10 Result 11110 In this computation also two 1-bit multiplication is performed. While in case of standard multiplication 9 multiplication is required, and Karatsuba algorithm use 4 multiplication. I. CONCLUSION From the proposed binary multiplication method we can see that the Nikhilam multiplier uses less operational steps than the standard multiplier and other multiplier like Karatsuba algorithm. So it is found to be efficient in view of less operational steps and smaller multiplications. Hence the proposed binary multiplication method may be used in ECC efficiently. We are planning the hardware implementation of Elliptic Curve Cryptography system using binary Nikhilam multiplier embedded in FPGA. REFERENCES [1] Jagadguru Swami Sri Bharath Krishna Tirthaji, “Vedic Mathematics or Sixteen Simple Sutras from Vedas”, Motilal Bhandaridas, Varanasi (India), 1986. [2] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C” – Second Edition. [3] Mr. Dharmendra Madke, Prof. Sameena Zafar, “Polynomial Multiplication Using Karatsuba and Nikhilam Sutra”- International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol-4, Issue-6, June-2014, pp. 1423- 1428. [4] Prokash Barman, Dr. Banani Saha, “E-Governance Security using Public Key Cryptography with special focus on ECC” – International Journal of Engineering Science Invention (IJESI), Vol-2, Issue-8, August 2013, pp. 10-16. [5] Shri Prakash Dwivedi, “An Efficient Multiplication Algorithm Using Nikhilam Method”- arXiv:1307.2735v1 [cs.DS] 10 Jul 2013 [6] Krzysztof Jankowski, Pierre Laurent, Aidan O’Mahony, “Intel Polynomial Multiplication Instruction and its Usage for Elliptic Curve Cryptography” –White paper, April 2012 [7] Wikipedia, http://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication - accessed on 17-09-2014