SlideShare a Scribd company logo
1 of 6
Download to read offline
The International Journal Of Engineering And Science (IJES)
|| Volume || 4 || Issue || 4 || Pages || PP.45-50 || 2015 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 45
An Efficient Elliptic Curve Cryptography Arithmetic Using
Nikhilam Multiplication
1,
Prokash Barman, 2,
Banani Saha
1, 2,
Department of Computer Science & Engineering, University of Calcutta
Kolkata, India
-------------------------------------------------------------ABSTRACT-----------------------------------------------------------
Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC)
arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher
order classical (standard) multiplication many intermediate operations are required. Reduced operation in
multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient
multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic
mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The
Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional
speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication.
KEYWORDS - Elliptic Curve Cryptography, Nikhilam Sutra, Vedic Mathematics, Karatsuba algorithm,
scalar multiplication, Vedic mathematics, ECC arithmetic.
-------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 02-February-2015 Date of Accepted: 15-April-2015
-------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Cryptography is a technique of making message secure or secret. Sensitive information can stored or
transmitted across secure or insecure network with secure or secret message transmission method. So that an
unauthorised person can’t access the secret message. One of the best public key cryptographic methods to secure
message is Elliptic Curve Cryptography. In this cryptographic method, major time consuming operations are (1)
Point Addition and (2) Point Doubling which needs scalar (integer) multiplication.
Generally, multiplication uses standard or classical method. But classical method to multiply two n-bit
integer requires n2
operations [5]. Karatsuba method of multiplication uses divide-and-conquer technique to
multiply two n-bit integers in nlog
3 operations [5]. But for small inputs Karatsuba algorithm works slower than
the classical multiplication algorithm because of recursive operational overhead. To overcome this problem we
use Nikhilam Sutra of Vedic Mathematics. This Nikhilam Sutra (algorithm) performs large integer multiplication
by converting it into small integer multiplication along with some addition and shift operation.
This paper is organised in the following sections. Section II describes Elliptic Curve Cryptography
Arithmetic along with some conventional scalar multiplication methods. Nikhilam Navatascharamam Deshatah
(Nikhilam Sutra) have been discussed in section III. The use of Nikhilam Sutra in ECC is depicted in section IV.
Section V conclusion is described.
II. ELLIPTIC CURVE CRYPTOGRAPHY ARITHMETIC
An Elliptic Curve is defined as an equation having set of solution with the point at infinity. The elliptic
y2
+xy=x3
+ax+b in GF(2m) and y2
=x3
+ax+b in GM(P) are called weierstrass equations. Variables and
coefficients are chosen from a large finite field. These points form a group. The group operation for elliptic
curve cryptography are point multiplication, point addition and point doubling. Elliptic Curve Point
Multiplication is the operation of successively adding a point along an elliptic curve to itself repeatedly- which is
called as “Elliptic Curve Scalar Multiplication” [6]. The operation denoted as
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 46
nP = P + P + P + P + . . . . . . . . . . . . + P for some scalar (integer) n and a point P(x,y) that lies on the
curve E: y2
=x3
+ax+b (Weirerstrass Curve). The security of Elliptic Curve Cryptography depends on the
intractability of determining n from Q=nP, given known value of Q and P. It is known as Elliptic Curve discrete
logarithm problem.
Point addition
Point addition [7] is defined as taking two points along a curve E and computing where a line through
them intersects the curve. The negative of the intersection point is used as the result of the addition.
ECC Point addition
The operation is denoted as P + Q = R or (Xp , Yp) + (Xq , Yq) = (Xr , Yr). This can be algebraically
calculated by :
Note that we assume the elliptic field is given by
Point Doubling
Point doubling [7] is similar to point addition, except one takes the tangent of a single point and finds
the intersection with the tangent line.
ECC Point Doubling
The operation is denoted as 2J=L or (Xp , Yp) + (Xp , Yp) = (Xr , Yr). This can be algebraically
calculated by :
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 47
Where a is the multiplication factor of X in the elliptic field given by .
Point multiplication [7] :
The straight forward way of computing a point multiplication is through repeated addition. However, this is a
fully exponential way to computing the multiplication. The multiplication method is as follows
Double and add:
To compute the double dP of a point P, start with the binary representation of d
d = d0 + 2d1 + 22
d2 + 23
d3 + - - - - - - - - - 2m
dm
where [d0 - - - - - dm] Σ {1, 0}
Algorithm:
Input : P, m
Output: Q
Q=0
For i from m to 0 do
Q=2Q (using point doubling)
If di = 1 then Q = Q + P (using point addition)
Return Q
An alternative way of the above may also be derived using recursive function
Algorithm:
Input:
Output: P + ,
is
if n = 0 then return 0
else if n mod 2=1 then
P + [addition if n is odd]
else [doubling if n is even]
Here the function for doubling, P is the coordinate to double, n is the number of times to double the
coordinate.
Example:
100P = = 2 ( 2 ( P + 2 ( 2 ( 2 ( P + 2P) ) ) ) )
This algorithm requires Log2 (n) iteration of point doubling and addition to compute the full point multiplication.
There are many variations of this algorithm such as window, sliding window, NAF, NAF-W, vector chains and
Montogomery ladder which are beyond our current discussion.
III. NIKHILAM NAVATASCHARAMAM DESHATAH (NIKHILAM SUTRA) MULTIPLICATION
One of the 16 Sutras of Vedic Mathematics is Nikhilam Sutra. It can be used to convert large digits multiplication
to small digits multiplication with the help of few extra add, subtract and shift operations [5]. In some cases two-digit
multiplication can be performed using only one digit multiplication instead of 3 one digit multiplication required with
Karatsuba algorithm. The Vedic formula under consideration is Nikhilam Navatascharamam Deshatah [1], which means all
from 9 and last from 10. The mathematical derivation of the algorithm is given as follows.
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 48
Consider 98 X 97
Nearest base = 100
98 (100-98)
97 (100-97)
98 2
97 3
95 06
Result = 98 X 97 = 9506
Figure 1: Multiplication using Nikhilam Sutra
With the help of Nikhilam Sutra two three digit multiplication can be performed with only one multiplication
along with some addition and shift operations as shown in the table below
Table-I
Multiplication of 107 * 109
Integer Base Difference
Multiplicand 107 (100-107)= -7
Multiplier 109 (100-109)= - 9
Computation (107-(-9))=(109-(-7))=116 (-7)*(-9)=63
116 63
Result 11663
For the above multiplication in standard method 9 multiplication is required and in Karatsuba algorithm 4
multiplication is required. The principle behind the Nikhilam Sutra is as follows:
Let the Multiplicand, m=x+a
Multiplier, n=x+b
where, x is the nearest base, then m*n= (x+a)*(x+b)=x(x+a+b) + ab
IV. USE OF NIKHILAM MULTIPLICATION IN ECC SCALAR MULTIPLICATION
The point multiplication in ECC is basically includes Point doubling and Point addition operations as described in
section II. These operations need scalar (integer) multiplication of large magnitude. In standard multiplication and Karatsuba
multiplication method n2
and nlog
3 operations required to multiply two n digits numbers. Whereas the Nikhilam method
require less multiplication operational steps. The use of Nikhlam method of multiplication in ECC scalar multiplication will
increase the overall speed of Elliptic Curve Cryptography operation.
The use of scalar multiplication in ECC arithmetic is done in (1) Point Doubling and (2) Point Addition in
the following cases
Point Doubling:
Left part of product Right part of product
Cross subtract right part of
product from any of left part of
the product i.e. 98-3=97-2=95
Result=Nearest Base X Computed Left Part+ Computed Right
Part. i.e. 100 X 95 + 06 = 9506
Subtract the multiplicand from nearest base
Subtract the multiplier from nearest base
Calculate the multiplication
result of right part of the product
i.e. 2 X 3 = 06
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 49
Point addition
The actual scalar (integer) multiplication in ECC [7] is shown in the figures. In some cases squaring is
also done with the nikhilam method.
V. PROPOSED WORK
As Nikhilam multiplication needs less operational steps compared to other conventional multiplication
methods, it is assumed that our proposed method of using nikhilam method in Point addition and Point doubling
of ECC arithmetic will increase the operational speed also. To use the nikhilam multiplier in ECC we propose
Binary Multiplication using Nikhilam method.
We can perform binary digit multiplication using Nikhilam sutra by converting n-bit multiplication to (n
- 1)-bit multiplication and some additional add/subtract and shift operation. We can apply this conversion
repeatedly until we get trivial multiplicand/multiplier or 1-bit multiplication. We can also put some threshold
limit m where 1 < m < n up to which we would like to do this conversion.
2-bit multiplication can be performed using single 1-bit multiplication. For example if we have to multiply
11X11. Here multiplicand M = 11, and multiplier N = 11. We can proceed as follows:
1. Compute A = 11 - 10; Subtract the multiplicand from nearest base
2. Compute B = 11-10; Subtract the multiplier from the same base
3. Compute C = B * A = 1 * 1 = 1
4. Compute D = M + B = N + A = 11 + 1 = 100
5. Result 10 * D + C = 1001
The only multiplication required in this computation (Table II) is for C in step 3.
TABLE II
BINARY MULTIPLICATION OF 11*11
Bits Base Difference
Multiplicand 11 (11-10)=1
Multiplier 11 (11-10)=1
(11+1)=100 (1*1)=1
Result 1001
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication
www.theijes.com The IJES Page 50
For 3-bit multiplication consider the example of 101 * 110
1. Compute A = 101*100; Subtract the multiplicand from nearest base
2. Compute B = 110 * 100; Subtract the multiplier from the same base
3. Compute C = 10 *1 = 10
4. Compute D = M + B = N + A = 101 + 10 = 111
5. Result 100 * D + C = 11110
TABLE III
BINARY MULTIPLICATION OF 101*110
Bits Base Difference
Multiplicand 101 (101-100)=1
Multiplier 110 (110-100)=10
(101+10)=111 (10*1)=10
Result 11110
In this computation also two 1-bit multiplication is performed. While in case of standard multiplication 9
multiplication is required, and Karatsuba algorithm use 4 multiplication.
I. CONCLUSION
From the proposed binary multiplication method we can see that the Nikhilam multiplier uses less
operational steps than the standard multiplier and other multiplier like Karatsuba algorithm. So it is found to be
efficient in view of less operational steps and smaller multiplications. Hence the proposed binary multiplication
method may be used in ECC efficiently. We are planning the hardware implementation of Elliptic Curve
Cryptography system using binary Nikhilam multiplier embedded in FPGA.
REFERENCES
[1] Jagadguru Swami Sri Bharath Krishna Tirthaji, “Vedic Mathematics or Sixteen Simple Sutras from Vedas”, Motilal Bhandaridas,
Varanasi (India), 1986.
[2] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C” – Second Edition.
[3] Mr. Dharmendra Madke, Prof. Sameena Zafar, “Polynomial Multiplication Using Karatsuba and Nikhilam Sutra”- International
Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol-4, Issue-6, June-2014, pp. 1423-
1428.
[4] Prokash Barman, Dr. Banani Saha, “E-Governance Security using Public Key Cryptography with special focus on ECC” –
International Journal of Engineering Science Invention (IJESI), Vol-2, Issue-8, August 2013, pp. 10-16.
[5] Shri Prakash Dwivedi, “An Efficient Multiplication Algorithm Using Nikhilam Method”- arXiv:1307.2735v1 [cs.DS] 10 Jul 2013
[6] Krzysztof Jankowski, Pierre Laurent, Aidan O’Mahony, “Intel Polynomial Multiplication Instruction and its Usage for Elliptic
Curve Cryptography” –White paper, April 2012
[7] Wikipedia, http://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication - accessed on 17-09-2014

More Related Content

What's hot

Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
GCD of n Numbers
GCD of n NumbersGCD of n Numbers
GCD of n NumbersSaikat Roy
 
Optimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data PerspectiveOptimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data Perspectiveপল্লব রায়
 
dynamic programming Rod cutting class
dynamic programming Rod cutting classdynamic programming Rod cutting class
dynamic programming Rod cutting classgiridaroori
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communicationsDeepshika Reddy
 
Stock price prediction regression nn
Stock price prediction   regression nnStock price prediction   regression nn
Stock price prediction regression nnZanshila Rodrigues
 
Design of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueDesign of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueKumar Goud
 
Greatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 YearsGreatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 Yearssixtyone
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)VARUN KUMAR
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slidesSHAMJITH KM
 
Global optimization
Global optimizationGlobal optimization
Global optimizationbpenalver
 
lecture 15
lecture 15lecture 15
lecture 15sajinsc
 
Minimization of Assignment Problems
Minimization of Assignment ProblemsMinimization of Assignment Problems
Minimization of Assignment Problemsijtsrd
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplicationKumar
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyDerek Callaway
 
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesAtomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesIJERA Editor
 

What's hot (20)

Topic 1.2
Topic 1.2Topic 1.2
Topic 1.2
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
GCD of n Numbers
GCD of n NumbersGCD of n Numbers
GCD of n Numbers
 
Optimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data PerspectiveOptimal Chain Matrix Multiplication Big Data Perspective
Optimal Chain Matrix Multiplication Big Data Perspective
 
dynamic programming Rod cutting class
dynamic programming Rod cutting classdynamic programming Rod cutting class
dynamic programming Rod cutting class
 
Convex optmization in communications
Convex optmization in communicationsConvex optmization in communications
Convex optmization in communications
 
Stock price prediction regression nn
Stock price prediction   regression nnStock price prediction   regression nn
Stock price prediction regression nn
 
Unit 2
Unit 2Unit 2
Unit 2
 
Design of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition TechniqueDesign of QSD Number System Addition using Delayed Addition Technique
Design of QSD Number System Addition using Delayed Addition Technique
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
Greatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 YearsGreatest Common Measure: the Last 2500 Years
Greatest Common Measure: the Last 2500 Years
 
Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)Lecture 11 (Digital Image Processing)
Lecture 11 (Digital Image Processing)
 
Numerical analysis m1 l3slides
Numerical analysis  m1 l3slidesNumerical analysis  m1 l3slides
Numerical analysis m1 l3slides
 
Global optimization
Global optimizationGlobal optimization
Global optimization
 
lecture 15
lecture 15lecture 15
lecture 15
 
Minimization of Assignment Problems
Minimization of Assignment ProblemsMinimization of Assignment Problems
Minimization of Assignment Problems
 
Business Logistics Assignment Help
Business Logistics Assignment HelpBusiness Logistics Assignment Help
Business Logistics Assignment Help
 
Stressen's matrix multiplication
Stressen's matrix multiplicationStressen's matrix multiplication
Stressen's matrix multiplication
 
An Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve CryptographyAn Introduction to Elleptic Curve Cryptography
An Introduction to Elleptic Curve Cryptography
 
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cyclesAtomic algorithm and the servers' s use to find the Hamiltonian cycles
Atomic algorithm and the servers' s use to find the Hamiltonian cycles
 

Viewers also liked

Rural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmentRural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmenttheijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
B031107018
B031107018B031107018
B031107018theijes
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection Systemtheijes
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphonetheijes
 
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave FrequenciesDielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave Frequenciestheijes
 
Mechanical behavior and statistical study of aluminum wires belonging to low...
	Mechanical behavior and statistical study of aluminum wires belonging to low...	Mechanical behavior and statistical study of aluminum wires belonging to low...
Mechanical behavior and statistical study of aluminum wires belonging to low...theijes
 
C031102018027
C031102018027C031102018027
C031102018027theijes
 
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...theijes
 
Modeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologyModeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologytheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challengestheijes
 
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...theijes
 
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...theijes
 
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed OilPhysicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oiltheijes
 
MEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science ClassMEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science Classtheijes
 
Critical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction ProjectsCritical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction Projectstheijes
 
Study Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart MaterialStudy Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart Materialtheijes
 

Viewers also liked (18)

Rural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable developmentRural development in Nigeria: problems and prospects for sustainable development
Rural development in Nigeria: problems and prospects for sustainable development
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
	Behavioral Malware Detection in Dtn Using Intrusion Detection System	Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
B031107018
B031107018B031107018
B031107018
 
Behavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection SystemBehavioral Malware Detection in Dtn Using Intrusion Detection System
Behavioral Malware Detection in Dtn Using Intrusion Detection System
 
Automatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphoneAutomatic Park and retrieve assissted systems for automobiles using smartphone
Automatic Park and retrieve assissted systems for automobiles using smartphone
 
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave FrequenciesDielectric Behaviour of Pzt Ceramics at Microwave Frequencies
Dielectric Behaviour of Pzt Ceramics at Microwave Frequencies
 
Mechanical behavior and statistical study of aluminum wires belonging to low...
	Mechanical behavior and statistical study of aluminum wires belonging to low...	Mechanical behavior and statistical study of aluminum wires belonging to low...
Mechanical behavior and statistical study of aluminum wires belonging to low...
 
C031102018027
C031102018027C031102018027
C031102018027
 
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
Determination of Work Index of Arufu Lead Ore, Nasarawa State, North-Central ...
 
Modeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technologyModeling of neural image compression using gradient decent technology
Modeling of neural image compression using gradient decent technology
 
J031101064069
J031101064069J031101064069
J031101064069
 
Understanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And ChallengesUnderstanding Cloud Computing, It's Services, Benefits, And Challenges
Understanding Cloud Computing, It's Services, Benefits, And Challenges
 
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...	Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
Explaining Customer Satisfaction with Experience, Customer Trust and Commitm...
 
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...	A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
A New Temperature-Based Model for Estimating Global Solar Radiation in Port-...
 
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed OilPhysicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
Physicochemical Characteristics of Fumarized and Maleinized Cottonseed Oil
 
MEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science ClassMEDITATION: A Pivot Factor to Start Up A Science Class
MEDITATION: A Pivot Factor to Start Up A Science Class
 
Critical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction ProjectsCritical Factors Influencing to Management Risk in Construction Projects
Critical Factors Influencing to Management Risk in Construction Projects
 
Study Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart MaterialStudy Analysis & Application of Bio-Composite Smart Material
Study Analysis & Application of Bio-Composite Smart Material
 

Similar to An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Karatsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationKaratsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationAtul Singh
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPERRaj kumar
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...TELKOMNIKA JOURNAL
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfRajJain516913
 
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...idescitation
 
IRJET- Solving Quadratic Equations using C++ Application Program
IRJET-  	  Solving Quadratic Equations using C++ Application ProgramIRJET-  	  Solving Quadratic Equations using C++ Application Program
IRJET- Solving Quadratic Equations using C++ Application ProgramIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
High Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsHigh Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsIOSR Journals
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docxbobbywlane695641
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docxgalerussel59292
 
COA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxCOA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxMala Gowda
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Pramit Kumar
 

Similar to An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Karatsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplicationKaratsuba algorithm for fast mltiplication
Karatsuba algorithm for fast mltiplication
 
JOURNAL PAPER
JOURNAL PAPERJOURNAL PAPER
JOURNAL PAPER
 
F044033742
F044033742F044033742
F044033742
 
Subquad multi ff
Subquad multi ffSubquad multi ff
Subquad multi ff
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
Implementation of Energy Efficient Scalar Point Multiplication Techniques for...
 
IRJET- Solving Quadratic Equations using C++ Application Program
IRJET-  	  Solving Quadratic Equations using C++ Application ProgramIRJET-  	  Solving Quadratic Equations using C++ Application Program
IRJET- Solving Quadratic Equations using C++ Application Program
 
A045030105
A045030105A045030105
A045030105
 
A045030105
A045030105A045030105
A045030105
 
Vedic multiplier
Vedic multiplierVedic multiplier
Vedic multiplier
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
High Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing ApplicationsHigh Speed Signed multiplier for Digital Signal Processing Applications
High Speed Signed multiplier for Digital Signal Processing Applications
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docx
 
adminSticky Note- the process of inversion is shown in .docx
adminSticky Note- the process of inversion is shown in  .docxadminSticky Note- the process of inversion is shown in  .docx
adminSticky Note- the process of inversion is shown in .docx
 
COA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptxCOA Unit 2 chapter 2.pptx
COA Unit 2 chapter 2.pptx
 
Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)Matrix Multiplication(An example of concurrent programming)
Matrix Multiplication(An example of concurrent programming)
 
I43024751
I43024751I43024751
I43024751
 
Lecture 7.pptx
Lecture 7.pptxLecture 7.pptx
Lecture 7.pptx
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 4 || Issue || 4 || Pages || PP.45-50 || 2015 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 45 An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication 1, Prokash Barman, 2, Banani Saha 1, 2, Department of Computer Science & Engineering, University of Calcutta Kolkata, India -------------------------------------------------------------ABSTRACT----------------------------------------------------------- Multiplication is one of the most important operation in Elliptic Curve Cryptography (ECC) arithmetic. For point addition and point doubling in ECC scalar (integer) multiplication is required. In higher order classical (standard) multiplication many intermediate operations are required. Reduced operation in multiplication will increase the functional speed of ECC arithmetic. These goals can be achieved using ancient multiplication algorithm namely Nikhilam Sutra. Nikhilam Sutra is one of the Sutra (algorithm) within 16 Vedic mathematics Sutras (algorithms). Nikhilam Sutra is efficient for multiplying two large decimal numbers. The Sutra reduces multiplication of two large numbers into two smaller numbers multiplication. The functional speed of Elliptic Curve Cryptography can be increased using Nikhilam method for scalar multiplication. KEYWORDS - Elliptic Curve Cryptography, Nikhilam Sutra, Vedic Mathematics, Karatsuba algorithm, scalar multiplication, Vedic mathematics, ECC arithmetic. ------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: 02-February-2015 Date of Accepted: 15-April-2015 ------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Cryptography is a technique of making message secure or secret. Sensitive information can stored or transmitted across secure or insecure network with secure or secret message transmission method. So that an unauthorised person can’t access the secret message. One of the best public key cryptographic methods to secure message is Elliptic Curve Cryptography. In this cryptographic method, major time consuming operations are (1) Point Addition and (2) Point Doubling which needs scalar (integer) multiplication. Generally, multiplication uses standard or classical method. But classical method to multiply two n-bit integer requires n2 operations [5]. Karatsuba method of multiplication uses divide-and-conquer technique to multiply two n-bit integers in nlog 3 operations [5]. But for small inputs Karatsuba algorithm works slower than the classical multiplication algorithm because of recursive operational overhead. To overcome this problem we use Nikhilam Sutra of Vedic Mathematics. This Nikhilam Sutra (algorithm) performs large integer multiplication by converting it into small integer multiplication along with some addition and shift operation. This paper is organised in the following sections. Section II describes Elliptic Curve Cryptography Arithmetic along with some conventional scalar multiplication methods. Nikhilam Navatascharamam Deshatah (Nikhilam Sutra) have been discussed in section III. The use of Nikhilam Sutra in ECC is depicted in section IV. Section V conclusion is described. II. ELLIPTIC CURVE CRYPTOGRAPHY ARITHMETIC An Elliptic Curve is defined as an equation having set of solution with the point at infinity. The elliptic y2 +xy=x3 +ax+b in GF(2m) and y2 =x3 +ax+b in GM(P) are called weierstrass equations. Variables and coefficients are chosen from a large finite field. These points form a group. The group operation for elliptic curve cryptography are point multiplication, point addition and point doubling. Elliptic Curve Point Multiplication is the operation of successively adding a point along an elliptic curve to itself repeatedly- which is called as “Elliptic Curve Scalar Multiplication” [6]. The operation denoted as
  • 2. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 46 nP = P + P + P + P + . . . . . . . . . . . . + P for some scalar (integer) n and a point P(x,y) that lies on the curve E: y2 =x3 +ax+b (Weirerstrass Curve). The security of Elliptic Curve Cryptography depends on the intractability of determining n from Q=nP, given known value of Q and P. It is known as Elliptic Curve discrete logarithm problem. Point addition Point addition [7] is defined as taking two points along a curve E and computing where a line through them intersects the curve. The negative of the intersection point is used as the result of the addition. ECC Point addition The operation is denoted as P + Q = R or (Xp , Yp) + (Xq , Yq) = (Xr , Yr). This can be algebraically calculated by : Note that we assume the elliptic field is given by Point Doubling Point doubling [7] is similar to point addition, except one takes the tangent of a single point and finds the intersection with the tangent line. ECC Point Doubling The operation is denoted as 2J=L or (Xp , Yp) + (Xp , Yp) = (Xr , Yr). This can be algebraically calculated by :
  • 3. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 47 Where a is the multiplication factor of X in the elliptic field given by . Point multiplication [7] : The straight forward way of computing a point multiplication is through repeated addition. However, this is a fully exponential way to computing the multiplication. The multiplication method is as follows Double and add: To compute the double dP of a point P, start with the binary representation of d d = d0 + 2d1 + 22 d2 + 23 d3 + - - - - - - - - - 2m dm where [d0 - - - - - dm] Σ {1, 0} Algorithm: Input : P, m Output: Q Q=0 For i from m to 0 do Q=2Q (using point doubling) If di = 1 then Q = Q + P (using point addition) Return Q An alternative way of the above may also be derived using recursive function Algorithm: Input: Output: P + , is if n = 0 then return 0 else if n mod 2=1 then P + [addition if n is odd] else [doubling if n is even] Here the function for doubling, P is the coordinate to double, n is the number of times to double the coordinate. Example: 100P = = 2 ( 2 ( P + 2 ( 2 ( 2 ( P + 2P) ) ) ) ) This algorithm requires Log2 (n) iteration of point doubling and addition to compute the full point multiplication. There are many variations of this algorithm such as window, sliding window, NAF, NAF-W, vector chains and Montogomery ladder which are beyond our current discussion. III. NIKHILAM NAVATASCHARAMAM DESHATAH (NIKHILAM SUTRA) MULTIPLICATION One of the 16 Sutras of Vedic Mathematics is Nikhilam Sutra. It can be used to convert large digits multiplication to small digits multiplication with the help of few extra add, subtract and shift operations [5]. In some cases two-digit multiplication can be performed using only one digit multiplication instead of 3 one digit multiplication required with Karatsuba algorithm. The Vedic formula under consideration is Nikhilam Navatascharamam Deshatah [1], which means all from 9 and last from 10. The mathematical derivation of the algorithm is given as follows.
  • 4. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 48 Consider 98 X 97 Nearest base = 100 98 (100-98) 97 (100-97) 98 2 97 3 95 06 Result = 98 X 97 = 9506 Figure 1: Multiplication using Nikhilam Sutra With the help of Nikhilam Sutra two three digit multiplication can be performed with only one multiplication along with some addition and shift operations as shown in the table below Table-I Multiplication of 107 * 109 Integer Base Difference Multiplicand 107 (100-107)= -7 Multiplier 109 (100-109)= - 9 Computation (107-(-9))=(109-(-7))=116 (-7)*(-9)=63 116 63 Result 11663 For the above multiplication in standard method 9 multiplication is required and in Karatsuba algorithm 4 multiplication is required. The principle behind the Nikhilam Sutra is as follows: Let the Multiplicand, m=x+a Multiplier, n=x+b where, x is the nearest base, then m*n= (x+a)*(x+b)=x(x+a+b) + ab IV. USE OF NIKHILAM MULTIPLICATION IN ECC SCALAR MULTIPLICATION The point multiplication in ECC is basically includes Point doubling and Point addition operations as described in section II. These operations need scalar (integer) multiplication of large magnitude. In standard multiplication and Karatsuba multiplication method n2 and nlog 3 operations required to multiply two n digits numbers. Whereas the Nikhilam method require less multiplication operational steps. The use of Nikhlam method of multiplication in ECC scalar multiplication will increase the overall speed of Elliptic Curve Cryptography operation. The use of scalar multiplication in ECC arithmetic is done in (1) Point Doubling and (2) Point Addition in the following cases Point Doubling: Left part of product Right part of product Cross subtract right part of product from any of left part of the product i.e. 98-3=97-2=95 Result=Nearest Base X Computed Left Part+ Computed Right Part. i.e. 100 X 95 + 06 = 9506 Subtract the multiplicand from nearest base Subtract the multiplier from nearest base Calculate the multiplication result of right part of the product i.e. 2 X 3 = 06
  • 5. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 49 Point addition The actual scalar (integer) multiplication in ECC [7] is shown in the figures. In some cases squaring is also done with the nikhilam method. V. PROPOSED WORK As Nikhilam multiplication needs less operational steps compared to other conventional multiplication methods, it is assumed that our proposed method of using nikhilam method in Point addition and Point doubling of ECC arithmetic will increase the operational speed also. To use the nikhilam multiplier in ECC we propose Binary Multiplication using Nikhilam method. We can perform binary digit multiplication using Nikhilam sutra by converting n-bit multiplication to (n - 1)-bit multiplication and some additional add/subtract and shift operation. We can apply this conversion repeatedly until we get trivial multiplicand/multiplier or 1-bit multiplication. We can also put some threshold limit m where 1 < m < n up to which we would like to do this conversion. 2-bit multiplication can be performed using single 1-bit multiplication. For example if we have to multiply 11X11. Here multiplicand M = 11, and multiplier N = 11. We can proceed as follows: 1. Compute A = 11 - 10; Subtract the multiplicand from nearest base 2. Compute B = 11-10; Subtract the multiplier from the same base 3. Compute C = B * A = 1 * 1 = 1 4. Compute D = M + B = N + A = 11 + 1 = 100 5. Result 10 * D + C = 1001 The only multiplication required in this computation (Table II) is for C in step 3. TABLE II BINARY MULTIPLICATION OF 11*11 Bits Base Difference Multiplicand 11 (11-10)=1 Multiplier 11 (11-10)=1 (11+1)=100 (1*1)=1 Result 1001
  • 6. An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplication www.theijes.com The IJES Page 50 For 3-bit multiplication consider the example of 101 * 110 1. Compute A = 101*100; Subtract the multiplicand from nearest base 2. Compute B = 110 * 100; Subtract the multiplier from the same base 3. Compute C = 10 *1 = 10 4. Compute D = M + B = N + A = 101 + 10 = 111 5. Result 100 * D + C = 11110 TABLE III BINARY MULTIPLICATION OF 101*110 Bits Base Difference Multiplicand 101 (101-100)=1 Multiplier 110 (110-100)=10 (101+10)=111 (10*1)=10 Result 11110 In this computation also two 1-bit multiplication is performed. While in case of standard multiplication 9 multiplication is required, and Karatsuba algorithm use 4 multiplication. I. CONCLUSION From the proposed binary multiplication method we can see that the Nikhilam multiplier uses less operational steps than the standard multiplier and other multiplier like Karatsuba algorithm. So it is found to be efficient in view of less operational steps and smaller multiplications. Hence the proposed binary multiplication method may be used in ECC efficiently. We are planning the hardware implementation of Elliptic Curve Cryptography system using binary Nikhilam multiplier embedded in FPGA. REFERENCES [1] Jagadguru Swami Sri Bharath Krishna Tirthaji, “Vedic Mathematics or Sixteen Simple Sutras from Vedas”, Motilal Bhandaridas, Varanasi (India), 1986. [2] Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C” – Second Edition. [3] Mr. Dharmendra Madke, Prof. Sameena Zafar, “Polynomial Multiplication Using Karatsuba and Nikhilam Sutra”- International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Vol-4, Issue-6, June-2014, pp. 1423- 1428. [4] Prokash Barman, Dr. Banani Saha, “E-Governance Security using Public Key Cryptography with special focus on ECC” – International Journal of Engineering Science Invention (IJESI), Vol-2, Issue-8, August 2013, pp. 10-16. [5] Shri Prakash Dwivedi, “An Efficient Multiplication Algorithm Using Nikhilam Method”- arXiv:1307.2735v1 [cs.DS] 10 Jul 2013 [6] Krzysztof Jankowski, Pierre Laurent, Aidan O’Mahony, “Intel Polynomial Multiplication Instruction and its Usage for Elliptic Curve Cryptography” –White paper, April 2012 [7] Wikipedia, http://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication - accessed on 17-09-2014