Algorithmic Obfuscation over GF(2^m)

09/17/2018
by   Cunxi Yu, et al.
0

Galois Field arithmetic blocks are the key components in many security applications, such as Elliptic Curve Cryptography (ECC) and the S-Boxes of the Advanced Encryption Standard (AES) cipher. This paper introduces a novel hardware intellectual property (IP) protection technique by obfuscating arithmetic functions over Galois Field (GF), specifically, focusing on obfuscation of GF multiplication that underpins complex GF arithmetic and elliptic curve point arithmetic functions. Obfuscating GF multiplication circuits is important because the choice of irreducible polynomials in GF multiplication has the great impact on the performance of the hardware designs, and because the significant effort is spent on finding an optimum irreducible polynomial for a given field, which can provide one company a competitive advantage over another.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/07/2023

Multiplication polynomials for elliptic curves over finite local rings

For a given elliptic curve E over a finite local ring, we denote by E^∞ ...
research
07/18/2021

Elliptic Curve Fast Fourier Transform (ECFFT) Part I: Fast Polynomial Algorithms over all Finite Fields

For smooth finite fields F_q (i.e., when q-1 factors into small primes) ...
research
01/11/2020

On Polynomial Modular Number Systems over Z/pZ

Polynomial Modular Number System (PMNS) is a convenient number system fo...
research
10/10/2019

Research on a Hybrid System With Perfect Forward Secrecy

The rapid development of computer technology will be the whole world as ...
research
01/27/2021

An Open-source Library of Large Integer Polynomial Multipliers

Polynomial multiplication is a bottleneck in most of the public-key cryp...
research
10/25/2016

On the optimality of ternary arithmetic for compactness and hardware design

In this paper, the optimality of ternary arithmetic is investigated unde...
research
10/19/2017

A Survey on Hardware Implementations of Elliptic Curve Cryptosystems

In the past two decades, Elliptic Curve Cryptography (ECC) have become i...

Please sign up or login with your details

Forgot password? Click here to reset