Table 4: Complexity comparison.
Space Complexity Time Complexity
Method # AND # XOR T
A
T
X
This paper 14.5k
1.31
69.6k
1.31
−31k + k
0.5
(8log
3
(k) + 39) 8 16log
3
(k) + 20
FH
∗
binary k
1.58
5.5k
1.58
−5k −0.5 1 2log
2
(k) + 1
FH
∗
ternary k
1.63
4.8k
1.63
−4k −0.8 1 3log
3
(k) + 1
FH
∗
= (Fan and Hasan, 2007);
8 CONCLUSION
In this paper we have presented a novel algorithm to
perform multiplication in binary field, using a Dou-
ble Polynomial System of representation. This system
enables the use of Fast Fourier Transform in the mul-
tiplication according to Lagrange representation. The
resulting multiplier still achieves a logarithmic time
complexity, but asymptotically improves the space
complexity from O(k
1.58
) to O(k
1.31
),
Our method is a first approach to reduce the space
complexity of binary field multiplier. In particular,
some optimizations can be done to reduce the con-
stant factors in the complexity. For example, a lot of
multiplications by a constant are counted as full mul-
tiplication in the current complexity evaluation.
Furthermore, one can also reduce the exponent
in the space complexity by replacing Fan and Hasan
multipliers with a quasi-linear approach (e.g. Schön-
hage’s technique (Schonhage, 1977)).
REFERENCES
Berlekamp, E. (1982). Bit-serial Reed-Solomon encoder.
IEEE Transactions on Inf. Th., IT-28.
Diffie, W. and Hellman, M. (1976). New directions in cryp-
tography. IEEE Transactions on Information Theory,
24:644–654.
Fan, H. and Dai, Y. (2005). Fast bit-parallel GF(2
n
) mul-
tiplier for all trinomials. IEEE Trans. on Comp.,
54(4):485–490.
Fan, H. and Hasan, A. (2007). A new approach to
subquadratic space complexity parallel multipliers
for extended binary fields. IEEE Trans. Comput.,
56(2):224–233.
Gao, S. (1993). Normal Bases over Finite Fields. Phd the-
sis, Waterloo University, Canada.
Gathen, J. v. and Gerhard, J. (1999). Modern Computer
Algebra. Cambridge University Press, New York, NY,
USA.
Giorgi, P., Jeannerod, C.-P., and Villard, G. (2003). On
the complexity of polynomial matrix computations.
In Proceedings of ISSAC’03, Philadelphia, Pennsyl-
vania, USA, pages 135–142. ACM Press.
Guajardjo, J. and Paar, C. (1997). Efficient algorithms for
elliptic curve cryptosystems. In Advances in Cryp-
tology, Proceedings of Eurocrypt’97, volume 1233 of
LNCS, pages 342–356. Springer-Verlag.
Hasan, M., Wang, M., and Bhargava, V. (1993). A Mod-
ified Massey-Omura Parallel Multiplier for a Class
of Finite Fields. IEEE Transactions on Computeurs,
42(10):1278–1280.
J.-C. Bajard, L.Imbert, T. P. (2005). Modular num-
ber systems: Beyong the mersenne family. In
SAC’04,Waterloo, Canada, volume 3357 of LNCS,
pages 159–169. Springer-Verlag.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathe-
matics of Computation, 48:203–209.
Mastrovito, E. (1991). VLSI architectures for computations
in Galois fields. PhD thesis, Dep.Elec.Eng.,Linkoping
Univ.
Miller, V. (1986). Use of elliptic curves in cryptogra-
phy. In Advances in Cryptology, proceeding’s of
CRYPTO’85, volume 218 of LNCS, pages 417–426.
Springer-Verlag.
Montgomery, P. L. (1985). Modular multiplication with-
out trial division. Mathematics of Computation,
44(170):519–521.
Mulders, T. and Storjohann, A. (2003). On lattice reduction
for polynomial matrices. Journal of Symbolic Compu-
tation, 35(4):377–401.
Schonhage, A. (1977). Schnelle multiplikation von poly-
nomen uber korpern der charakteristik 2. Acta Infor-
matica, 7:395–398.
Villard, G. (1996). Computing Popov and Hermite forms
of polynomial matrices. In Proceedings of ISSAC’96,
Zurich, Suisse, pages 250–258. ACM Press.
SECRYPT 2007 - International Conference on Security and Cryptography
236