 Research
 Open access
 Published:
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
EURASIP Journal on Wireless Communications and Networking volumeÂ 2021, ArticleÂ number:Â 82 (2021)
Abstract
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve cryptography (ECC). In this paper, we propose a fast formula for point septupling on elliptic curves over binary fields using division polynomial and multiplexing of intermediate values to accelerate the computation by more than 14%. We also propose a scalar multiplication algorithm based on the step multibase representation using point halving and the septuple formula we proposed, which significantly reduces the computational cost. The experimental results show that our method is more efficient over binary fields and contributes to reducing the complexity of ECC.
1 Introduction
The Internet of Things (IoT) is developing rapidly in theory and application. With the development of narrow band Internet of Things (NBIoT) and the accelerating popularity of 5G, the cost of connecting devices to IoT has been reduced, which greatly promotes its development. As a result, more and more devices are connected to the Internet of Things in various fields, from smart terminals to industrial facilities. Devices connected to the Internet of Things continue to generate and transmit large amounts of information. But the availability of wireless communication links to attackers means that data on the Internet of Things are vulnerable to various types of attacks, such as data eavesdropping and data tampering. Therefore, it is not safe to transmit information in plaintext form on the Internet of Things. Cryptography is the most widely used method to ensure the security of data transmission and sharing in the network. Encrypted data transmission on the Internet of Things has become the key to secure communication between devices. RSA public key cryptography has been well researched and widely used since the introduction of Rivest, Shamir and Adleman in 1975. The system relies on Integer Decomposition Problem (IFP), which typically uses a 1024bit or more key. In 1976, Hellman proposed a public key exchange algorithm based on the Discrete Logarithm Problem (DLP) [1]. In 1986, Miller [2], Koblitz [3] independently proposed the Elliptic Curve Cryptography (ECC). ECC is a kind of encryption technology based on DLP. It uses elliptic curve in finite domain to generate finite Abel group to implement public key cryptographic primitives. Unlike the RSA algorithm, which relies on the subexponential time algorithm to solve the integer decomposition problem, the best algorithm for solving the basic mathematical problems of ECC involves the Elliptic Curve Discrete Logarithm Problem (ECDLP). This leads to the infeasibility of solving the ECDLP algorithm, which increases rapidly with the size of the problem and is much higher than integer factorization and discrete logarithm problem. Therefore, ECC requires only smaller keys than public key cryptography (such as RSA and ElGamal), while providing the same level of security. For example, an ECC that provides the same level of security as RSA with a 1024bit key size requires only 160 keys. Due to the high security of per key length, ECC is widely used for mobile devices and IoT. However, ECC operations are still very complex and costly for devices with poor computing power, limited energy reserves and intensive data transmission in IoT. This poses a challenge for the longterm stable function and realtime data transmission of IoT devices. Therefore, we need to improve the operation of ECC to make it lighter, thereby increasing the efficiency of cryptography and reducing costs.
The operation of the ECC works on a multiplication group over a finite field. The scalar multiplication of an elliptic curve is an operation that adds a point P on the curve k times.
where \(P\) is a point on an elliptic curve and k is a large positive integer. In any primitive implementations of ECC, scalar multiplication is the main computing operation. The key factor to improve the efficiency of ECC is how to realize fast scalar multiplication. Therefore, many researchers have proposed various studies on accelerated scalar multiplication. Morain et al. [4] proposed the nonadjacent form (NAF), which is a signed form of representation. This form ensures that at least one of any two adjacent terms is zero. Solinas et al. proposed the Joint Sparse Form (JSF) based on NAF [5]. JSF is the best signed binary representation of a pair of integers, which can generate more doublezero bits than NAF. Koblitz [6] and Solinas [7], respectively, proposed an anomalous binary curve on which Frobenius mapping can be used, and an effective scalar representation on that curveâ€”reduced \(\tau\)adic nonadjacent form (RTNAF). The squaring on an anomalous binary curve is implemented by a displacement, which can be performed in a very short time. Under the RTNAF representation, the scalar multiplication \(\tau P\) is quickly obtained by squaring on the \(x\) and \(y\) coordinates of the point \(P\). Cohen proposed a more efficient hybrid addition operation by combining projective coordinates and affine coordinates into mixed coordinates [8]. The introduction of Jacobian coordinates eliminates expensive inversion operation in scalar multiplication under affine coordinates. In recent years, the method of expressing a large integer \(k\) by double base and multibase has attracted widespread attention. Dimitrov [9] first proposed the DoubleBase Number System (DBNS) and applied it to speed up scalar multiplication, which effectively reduces the number of point additions in scalar multiplication, by taking advantage of the sparseness and the ternary nature of DBNS. But there are some repetitive computations in DBNS. In order to solve this problem, Dimitrov [10] proposed DoubleBase Chain (DBC) on the basis of DBNS. DBC performs computations in a nested form, so that the results of each part of the computation will be reused, reducing the occurrence of repeated computations. Mishra extended DBNS to MultiBase Number Representation (MBNR), breaking the limitation that only two bases can be used to represent scalars, so as to bring higher redundancy in the representation of scalars [11]. But MBNS has some repetitive computations like DBNS.
In this paper, we propose an efficient formula for fast computation of the sevenfold of elliptic curve points over the binary fields, which can be used in DBNS and MBNR to compute the scalar multiplication of elliptic curves. This formula uses division polynomial and multiplexing of intermediate values in affine coordinates to increase the speed of computing the sevenfold point by more than 14%. We also proposed a scalar multiplication algorithm based on the Step MultiBase Representation (SMBR). This algorithm uses the sevenfold point formula we proposed and replaces the traditional point doubling with the faster point halving. Experimental results show that our scalar multiplication algorithm is more efficient in affine coordinates over binary fields and contributes to reducing the cost of cryptography for devices in the IoT.
The organization of this paper is as follows. In Sect.Â 2, we briefly introduce the basics of elliptic curves, point halving, doublebase chain and multibase representations. In Sect.Â 3, we give an efficient formula for computing the sevenfold point of an elliptic curve over binary fields and provide proof of the formula and analysis of the computational cost. In Sect.Â 4, we propose a scalar multiplication algorithm based on SMBR and give the method of scalar \(k\) conversion to SMBR and the detailed steps of the scalar multiplication algorithm. In Sect.Â 5, we show experimental results, compare and analyze our algorithm with other research and demonstrate that our method is more efficient. Finally, in Sect.Â 6, we draw our conclusions.
2 Related work
In this section, we will review the concepts and research status of ECC, point halving, doublebase chains and step multibase representation.
2.1 Elliptic curve cryptography (ECC)
Definition 1
(Elliptic curve cryptography) An elliptic curve \(E\) over a finite field \(GF\) field \(K\) can be defined by the Weierstrass equation
where \(\begin{array}{*{20}l} {a_{1} , \, a_{2} , \, a_{3} , \, a_{4} , \, a_{6} \in K} \hfill \\ \end{array}\), and \(\Delta \ne 0\),where \(\Delta\) is the discriminant of \(E\).
In practice, adjusting the variables within the admissible range can greatly simplify the Weierstrass Eq.Â (1).
Over prime fields,\(K = F_{P}\), if the characteristic of \(K\) is not equal to 2 and 3, then Eq.Â (1) can be simplified to
where \(a,b \in F_{p}\), \(\begin{array}{*{20}l} {\Delta = 4a^{3} + 27b^{2} \ne 0} \hfill \\ \end{array}\).
Over binary fields, \(K = F_{{{2}^{m} }}\), the elliptic curve \(E\) is called the nonsupersingular curve, and Eq.Â (1) can be rewritten as
where \(a,b \in F_{{2^{m} }}\),\(\Delta = b \ne 0\).
The set \(E(K)\) of rational points and the infinity point \(O\) defined on an elliptic curve \(E\) over a field \(K\) form an abelian group under the operation (usually denoted by addition) defined by the law of chord and tangent. If the points on an elliptic curve \(E\) are represented in affine coordinates, such as \(P = (x,y)\) and \(Q = (u,v)\), then both the point addition (\(P + Q\)) and point doubling (2P) require an expensive field inverse operation. We use \([i]\),\([s]\) and \([m]\) to represent the computational cost of one inversion \(I\), one squaring \(S\) and one multiplication \(M\), respectively. In order to facilitate the gauging of the computational cost of inversions, the \([i]/[m]\) ratio is defined according to the ratio of the cost between one inversion and one multiplication. It is generally assumed that \({3} \le [i]/[m] \le 10\) for the binary fields [12], and \([i]/[m] \ge 30\) for the prime fields [13]. In addition, squaring is the least expensive of the three main operations. Over binary fields, squaring is a linear operation with negligible computational cost, and it is generally assumed that \([s] \le 0.1[m]\) [12]. Over prime fields, \([s] = 0.8[m]\) is generally assumed, but in order to prevent sidechannel attacks (SCA) from using sidechannel atomicity [14], the same multiplier needs to be used to perform squarings and multiplications, then \([s] = [m]\).
2.2 Point halving
The point halving independently proposed by Knuden [15] and Schroeppel [16] is a reverse operation of point doubling. Assume that \(P = (x,y)\) and \(Q = (u,v)\) are two points defined on the elliptic curve \(E\) Over binary field and expressed in affine coordinates, satisfying \({\text{Q}} = 2P\). If we know the affine coordinates of the point \(P\), the coordinates of point \(Q\) can be obtained by point doubling using the following equation:
Point halving is the completely opposite operation. When \(Q = (u,v)\) is known, find \(P = (x,y)\) so that \({\text{Q}} = 2P\), denoted as \({\text{P = }}\frac{{1}}{{2}}Q\). First, we need to solve \(\lambda^{2} + \lambda = u + a\) according to Eq.Â (5) to get \(\lambda\), then solve \(x^{2} = v + u(\lambda + 1)\) from Eq.Â (6) to get \(x\) and finally calculate \(y = \lambda x + x^{2}\) based on Eq.Â (4) to get \(y\). The logic of the point halving is shown in Algorithm 1. The detailed analysis of the solving process and the calculation complexity about point halving are shown in [13].
Point halving is less expensive to compute than point doubling, and the advantage is more evident when the point \(P\) is unknown in advance and the \([i]/[m]\)ratio is small [13]. If the doubling required in the usual doubleandadd operations is all replaced by point halving, the calculation speed can be accelerated by 50% [16].
2.3 Doublebase chain (DBC)
The DoubleBase Number System (DBNS) was originally proposed by Dimitrov [9] as a scheme for the representation of positive integers, where each positive integer \(k\) can be expressed as the sum or difference of a number of 2integers (the product of the powers of two relatively prime positive integers). For example, the positive integer \(k\) represented by the application of {2,3}integers (the subformats are \(2^{b} 3^{t}\)) are
In [9], Dimitrov described the attributes of DBNS and proved that DBNS have a high degree of redundancy. Obviously, there are no unique forms of DBNS representation of an integer. For example, there are 5 different DBNS representations of 10, 72 representations of 50 and 402 representations of 100, where only positive sums (\(s_{i} = 1\),\(i \in [1,m]\)) are considered. The number of representations grows rapidly as the integer k increase.
Subsequently, Dimitrov [10] developed the DoubleBase Chain (DBC) and specified that a DBNS can only be transformed into a DBC if the exponent of the base in the DBNS is a decreasing sequence, that is \(k = \sum\nolimits_{i = 1}^{m} {s_{i} 2^{{b_{i} }} 3^{{t_{i} }} }\) and satisfies \(s_{i} \in \{  1,1\}\),\(b_{1} \ge b_{2} \ge \cdots \ge b_{m} \ge 0\) and \(t_{1} \ge t_{2} \ge \cdots \ge t_{m} \ge 0\).
Definition 2
(Doublebase chain (DBC)) Given a positive integer \(k > 0\), a sequence \((C_{n} )_{n > 0}\) of positive integers, if it satisfies:
for some \(u,v \ge 0\), such that \(\exists m > 0\) satisfies \(C_{m} = k\), the sequence \(C_{m}\) is called a doublebase chain of \(k\), and \(m\) is the length of this doublebase chain. The length of the double base chain is equal to the number of \(2^{b} 3^{t}\) subitems in DBNS.
Double base chain make all calculated values reusable by restricting the sequence \((b_{i} )\) and \((t_{i} )\) in DBNS to decrease monotonically (i.e.,\(b_{1} \ge b_{2} \ge \cdots \ge b_{m} \ge 0\), \(t_{1} \ge t_{2} \ge \cdots \ge t_{m} \ge 0\)) and by applying recursive calculations. The doublebase chain representations are highly redundant and can dramatically reduce the Hamming weights in scalar expansion. Algorithm 2 gives the process for transforming a large integer \(k\) into DBNS that conform to exponential constraints.
In Algorithm 2, the maximum exponential limit on the base \(x\) is generally set to \(\log_{x} (k)\), i.e., \(b_{\max } < \log_{2} (k) \le n\), \(t_{\max } < \log_{3} (k) \le 0.65n\), where \(n\) is the binary bit size of the positive integer \(k\). With a positive integer of 160bit size, for example, \(b_{\max } = 160\) and \(t_{\max } = 103\) can be specified.
The ternary/binary method for fast computation of ECC scalar multiplication proposed by Ciet [17] was subsequently applied to doublebase chain to decrease the number of inversions and the execution time by efficient point doubling (\(2P\)), point tripling (\(3P\)) and point quadrupling (\({4}P\)).
2.4 Step multibase representation (SMBR)
In [11], Mishra extends the DoubleBase Number System to MultiBase Number Representation. Given a large positive integer \(k\) and a set \(B = \{ b_{{1}} ,b_{2} , \ldots ,b_{l} \}\) of small positive integers, if there exists an expression for \(k\) which is the sum of the products of the powers of the elements in base \(B\), i.e.,\(k = \sum\nolimits_{j = 1}^{m} {(s_{j} \prod\nolimits_{i = 1}^{l} {b_{i}^{{e_{ij} }} )} }\),with \(s_{j} \in \{  1,1\}\) and \(e_{ij} \ge 0\), then the above equation is called the multibase number representation of the integer \(k\) using base \(B\). The integer \(m\) is the length of the MBNR and \(\left {\text{B}} \right\) denotes the number of elements in the set of B. If \(\left B \right = 2\), the MBNR is simplified to a DBNS. DBNS already has a high degree of redundancy and a short expression. MBNR has a higher redundancy and shorter expressions than DBNS.
Definition 3
(Step multibase representation) A step multibase representation based on the set \(B = \{ b_{{1}} ,b_{2} , \ldots ,b_{l} \}\) is
where \(\forall j \in \{ 1,2, \ldots ,l\}\), the sequence \((e_{j} )\) is monotonously decreasing, then it is called the step multibase representation of the integer k.
SMBR can be seen as a generalized extension of the DBC. If \(\left B \right = 2\), the SMBR is simplified to a DBC. Same as the DBC, all intermediate calculated values can be reused in SMBR. Thus, SMBR has a higher redundancy and can further reduce the Hamming weights in scalar expansion. As the efficient formula for point quintupling was proposed in [11], the SMBR based on \(B = \{ 2,3,5\}\), i.e., \(k = \sum\nolimits_{i = 1}^{m} {s_{i} 2^{{b_{i} }} } 3^{{t_{i} }} 5^{{q_{i} }}\), is widely used and studied [18, 22]. In the scalar multiplication algorithm, the selection of the base of SMBR will determine the computational performance of the algorithm. Replacing the existing base with a more efficient multiplepoint formulas can further increase the redundancy of the expression and reduce the computational cost of scalar multiplication algorithm. Therefore, in Chapter 3, we proposed an efficient septuple formulas, and in Sect.Â 4, we proposed a scalar multiplication algorithm based on the SMBR with \(B = \{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\).
3 Septuple formula design
In this section, we give an efficient septuple formula for elliptic curve points over binary fields, a proof of the formula and an efficiency analysis.
3.1 Point septupling in elliptic curves over binary fields
In order to reduce inversions in multipoint operations, it is common practice in research work to convert points to other coordinate systems (e.g., the Jacobi coordinates). However, over binary fields, where the \([i]/[m]\)ratio is small, generally \({3} \le [i]/[m] \le 10\), the elliptic curve group arithmetic in affine coordinates already has excellent performance. Therefore, we propose a new point septupling formula in affine coordinates. Let \(P = (x,y)\) be a known point on an elliptic curve shown in Eq.Â (3) over a binary field. Assume that the sevenfold point of \(P\) is expressed as \({7}P = (u,v)\). Then, we can obtain \(u\) and \(v\) by the following formula:
Let us define a set of polynomials as follows: Then,
3.2 Proof of septuple formula over binary fields
For nonsupersingular curves over the binary fields, \(K = F_{{{2}^{m} }}\), there are division polynomials as follow:
The higher degree division polynomials can be deduced from the following recursive relations:
Applying these recursive relations, by sequentially assigning \(n = 2\) in Eq.Â (11), \(n = 3\) in Eq.Â (12), \(n = 3\) in Eq.Â (11) and \(n = {4}\) in Eq.Â (12), we can obtain:
Depending on the polynomials \(\psi_{{1}} \psi_{2} \psi_{3} \psi_{4}\) and the recurrence relation (11), (12), for any point \(P = (x,y)\) on a nonsupersingular curve, the nfold of this point can be derived from the formula:
where,
and
Assuming that the affine coordinates of \(7P\) is \((u,v)\), we can calculate directly from Eq.Â (14):
However, calculating \((u,v)\) directly using the Formulae above is not the most suitable method. In the process of calculating \(\psi_{{1}} \psi_{2} \ldots\psi_{8}\) and \((u,v)\), many intermediate values are generated. The calculation can be accelerated by transforming the formula forms and multiplexing the intermediate values. We define polynomials: \(A = x^{4} + x^{3} + a\), \(B = x(A + x^{3} )\),\(C = A^{3} + x^{4} B\), \(D = A(B^{2} + C)\), \(E = A^{6} + x^{4} B(A^{3} + B^{2} )\) and \(F = B(A^{2} D + C^{2} )\), then the transformed forms of formulae \(\psi_{{1}} \psi_{2} \ldots\psi_{8}\) and \((u,v)\) are as follows:
Substituting these values into formula (13) and then transforming, we can get septuple formula (10). The specific transformation process is as follows:
3.3 Cost of septuple formula over binary fields
Given a point \(P = (x,y)\) on a nonsupersingular curve (Eq.Â 3), let us check the subexpressions and costs required to compute \({7}P\) by applying Eq.Â (10) without any precomputation. Table 1 lists the subexpressions, intermediate values and costs for computing \({7}P\). Next, we analyze the efficiency of the septuple formula. Table 2 lists the costs of various field operations over binary fields. A number of methods for computing \({7}P\) have been proposed in previous research. In [19], the authors proposed several septuple formulae over prime fields, one with \(15[s] + 14[m]\) costs in Jacobian coordinates, and the other with \(9[s] + 13[m]\) costs in Jquartic coordinates. In [20], the author uses the expensive sevenfold point operation over binary fields, which requires three inversion, and the total computational cost is as high as \({3}[i] + {7}[s] + {18}[m]\). Later, in [21], the authors proposed two fast methods for point septupling over binary fields with computational costs of \({2}[i] + {7}[s] + {14}[m]\) (method 1) and \({1}[i] + {6}[s] + {20}[m]\) (method 2), and the breakeven ratio between the two methods is \([i]/[m] = 6\).
The costs of septuple formula we proposed is \({1}[i] + {7}[s] + {16}[m]\). Compared with the method in [20], the formula proposed in this paper reduces two inversion and two multiplication, resulting in a speed up of 33% at the ratio of \([i]/[m] = 4\) and 43% at the ratio of \([i]/[m] = 8\), with more speed up at higher \([i]/[m]\)ratio. Compared with the method 2 in [21], our formula reduces four multiplication and adds one squaring (the cost of squaring can be ignored over binary fields), and the speed is increased by 17% at the ratio of \([i]/[m] = 4\) and by 14% at the ratio of \([i]/[m]{ = 8}\), which is more significant when the \([i]/[m]\)ratio is smaller. Compared with the method 1 in [21], our formula reduces one inversion and adds two multiplication. The breakeven ratio between our formula and method 1 in [21] is \([i]/[m] = 2\). Our formula is faster when \([i]/[m] > {2}\), with up to 17% faster at the ratio of \([i]/[m] = 4\) and 20% faster at the ratio of \([i]/[m] = 8\). Over binary fields, the \([i]/[m]\)ratio is generally not less than 3 and is commonly assumed to be \([i]/[m] = 8\). Therefore, the septuple formula we proposed is more efficient than the methods in [20, 21].
4 Methods
In order to improve the computation speed of elliptic curve scalar multiplication, we modify the MBNR based on \(B = \{ 2,3,5\}\) proposed in [11] and propose a SMBR based on \(B = \{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\), denoted \(k = \sum\nolimits_{i = 1}^{m} {s_{i} (\frac{1}{2})^{{b_{i} }} 3^{{t_{i} }} 7^{{q_{i} }} }\). We retain the original point tripling, replace the point doubling and quadrupling with faster point halving, replace the point quintupling with the point septupling we proposed in Sect.Â 3 and restrict the exponential sequences \((b_{i} )\)\((t_{i} )\)\((q_{i} )\) of 1/2, 3 and 5 to decreasing monotonically, respectively. The modified SMBR is defined as follows.
Definition 4
(\(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)step multibase representation) A multibase number representation based on the set of \(B = \{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\).
where the sequence of \((b_{i} )\)\((t_{i} )\)\((q_{i} )\) is each monotonically decreasing. Then, the representation is called a \(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)step multibase representation of the integer \(k\).
Due to the inclusion of point halving, the \(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)SMBR of the large integer \(k\) has to be derived indirectly. Assuming that the size of the binary field is \(p\), firstly we find a large exponent \({2}^{r}\) with base 2 that the value approximating \(p\). Then, we multiply the original scalar \(k\) by \({2}^{r}\) and then model \(p\) and denote the result as \(k^{{\prime}}\), as shown in Eq.Â (15).
This allows us to transform finding a \(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)SMBR of \(k\) into finding a \(\{ {2},3,{7}\}\)MBNR with exponential restrictions of \(k^{{\prime}}\). Thus, the form of the representation of k can become
where \(s_{i} \in \{  1,1\}\), \(0 \le b^{{\prime}}_{1} \le b^{{\prime}}_{2} \le \cdots \le b^{{\prime}}_{m}\), \(t_{1} \ge t_{2} \ge \cdots \ge t_{m} \ge 0\) and \(q_{1} \ge q_{2} \ge \cdots \ge q_{m} \ge 0\).
Subsequently, we find MBNR of \(k^{{\prime}}\) with base \(\{ {2},3,{7}\}\) and restrict the exponential sequences of 3 and 7 monotonic decrease, but the exponential sequence of 2 monotonic increases. We obtain this MBNR in an iterative way. First, we find \(n\) such that \(k = 0\;\,\bmod\, \;n\), where the trial order of \(n\) is \(\left\{ {42,36,32,28,27,24,21,18,16,14,12,9,8,7,6,4,3,2} \right\}\). If \(k = 0\,\bmod\, {42}\), then return \({2} \cdot {3} \cdot {7}\left( \frac{k}{42} \right)\). If \(k = 0\,\bmod\, {36}\), then return \({2}^{2} \cdot {3}^{2} \left( \frac{k}{36} \right)\). If \(k = 0\,\bmod\, 32\), then return \({2}^{5} \left( \frac{k}{32} \right)\). And so on, if \(k = 0\;\,\bmod\, \;n\), then return \({2}^{{n_{1} }} \cdot {3}^{{n_{2} }} \cdot {7}^{{n_{3} }} \left( \frac{k}{n} \right)\), where \(2^{{n_{1} }} \cdot 3^{{n_{2} }} \cdot 7^{{n_{3} }} = n\). If no suitable match is found for all trials, we find a power of 2 that is closest to \(k\) denoted as \(k_{c}\) and return the absolute value \(\left {k  k_{c} } \right\) of the difference between \(k\) and \(k_{c}\). We chose the power of 2 as the approximation for k because point doubling will become point halving afterwards (and may also constitute halfandadd) with less cost than point tripling and point septupling. As the return value of \(\left {k  k_{c} } \right\) becomes smaller and smaller, it can always be approximated in the next round by a lower power of 2. So in this MBNR, the exponents of 2 are keep monotonically decreasing. Therefore, tripleandadd are rarely required in this scalar multiplication. The iterations do not stop until \(k\) is equal to 1 or the power of 2, 3 and 7, which means that for any nonnegative integer \(b\), \(t\) and \(q\), \(2^{b} 3^{t} 7^{q}\) can represent a positive integer. The return terms of this iterative algorithm form a MBNR of \(k^{{\prime}}\) and are ordered from the highest exponent of 2 multiplied by the lowest power of 3 and 7 to the lowest exponent of 2 multiplied by the highest power of 3 and 7. Then, we reverse the order of the subterms of the MBNR, so that the exponents of 3 and 7 decrease, and the exponents of 2 increase. Finally, by dividing the MBNR by \({2}^{r}\), so that all exponents of 2 are negative, the exponents of 1/2 are monotonically decreasing. From this, we can obtain an \(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)SMBR of \(k\) as shown in Eq.Â (16).
Based on this representation, we can propose a scalar multiplication for elliptic curves over binary fields using \(\{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\)SMBR, as described in Algorithm 3. The number of additions (including halfandadd and tripleandadd) is equal to the number of items in the presentation minus one. Halfandadd is used instead of addition as long as the exponent of 1/2 is not zero. If the exponent of 1/2 is zero, but the exponent of 3 is not zero, then tripleandadd is used instead of addition. Since there is no formula for quadrupleandadd, we can only use the typical addition operation if the exponents of 1/2 and 3 are zero at the same time. A total of \(b_{1}\) point halving (including halfandadd), \(t_{1}\) point tripling (including tripleandadd) and \(t_{1}\) point septupling are required in the execution of Algorithm 3.
5 Results and discussion
The experiments were performed on the elliptic curve recommended by the National Institute of Standards and Technology (NIST). The experiments are divided into three test groups in total, it including the elliptic curves NIST B163, NIST B233 and NIST B283, and the size of the binary field was selected as 160bit, 233bit and 283bit, respectively. In order to analyze the performance of the scalar multiplication algorithm proposed in this paper more visually, we compare our algorithm with the NAF proposed in [4], the DBC proposed in [10], the MBNR proposed in [11] and the MMBR proposed in [22]. For each test group, 1000 large integer scalar quantities \(k\) are selected at random, scalar multiplication is performed with each algorithm in turn without using any precomputation and prestorage points, the average of the number of field operations of each algorithm is counted, and the number of inverse, square and multiplication are expressed in terms of \(I\), \(S\) and \(M\), respectively. The experimental environment is: the hardware environment is Intel (R) Core (TM) i7 CPU @ 2.20Â GHz, the installed memory is 16Â GB, the software environment is LINUX operating system, and the algorithms are implemented in C/C++ with the Multiprecision Integer and Rational Arithmetic C/C++ Library.
In this section, the performance of our proposed algorithm is described in detail. In order to clearly compare the total computational cost of the different algorithms, we select \([i]/[m] = 8\) and ignore \([s]\) over binary fields. The comparison of the total computational cost of different scalar multiplication algorithms is shown in Fig.Â 1, the cost of all algorithms rises as the length of the scalar \(k\) grows. Since our algorithm and MMBR both use point halving operation, the computational cost is significantly lower than other algorithms. Compared with MMBR, our algorithm has better performance, and the greater the length of the scalar k, the more obvious the advantage of our algorithm. This is because our algorithm uses new septuple formulas we proposed, which is more effective in reducing the number of expensive field inverse operation than the quintuple formulas.
Table 3 shows that detailed data of computational cost of different scalar multiplication algorithms. On the curve NIST B163 (\(k = 16{0}\) bit), the cost of our algorithm is 35% lower than the NAF, 29% lower than the DBC, 25% lower than the MBNR and 3% lower than the MMBR. On the curve NIST B233(\(k = {233}\) bit), the cost of our algorithm is 37% lower than the NAF, 30% lower than the DBC, 26% lower than the MBNR and 4% lower than the MMBR. On the curve NIST B283(\(k = {283}\) bit), the cost of our algorithm is 38% lower than the NAF, 30% lower than the DBC, 27%lower than the MBNR and 4% lower than the MMBR. Based on the above results, we can see that the cost of the algorithm in this paper is significantly reduced compared with NAF, DBC, and MBNR and has a small enhancement compared with MMBR, and the improvement effect becomes more obvious with the increase in the length of the scalar \(k\). As a result, in the case of the same elliptic curve over binary fields and the same field size, the scalar multiplication algorithm we propose is more efficient.
6 Conclusions
ECC is a crucial method to ensure secure communication between devices in the IoT. Scalar multiplication is one of the major operations in ECC. How to reduce the computational complexity of ECC scalar multiplication is key to maintaining the longterm stable functioning of IoT devices. There has been much research proposing schemes to speed up scalar multiplication. In this paper, we present an efficient formula for point septupling on elliptic curves over binary fields in affine coordinates and a scalar multiplication algorithm based on the step multibase representation. The septuple formula uses division polynomial and multiplexing of intermediate values in affine coordinates to speed up computations by more than 14%. The scalar multiplication algorithm is based on the SMBR with \(B = \{ {{1} \mathord{\left/ {\vphantom {{1} {2}}} \right. \kern\nulldelimiterspace} {2}},3,{7}\}\), which drastically reduces the computational cost by using point halving and the point septupling we propose. The experimental results indicate that our method can effectively reduce the cost of scalar multiplication for elliptic curves over the binary fields and contribute to the lightweight of ECC. In addition, the elliptic curve scalar multiplication method studied in this paper is still at the theoretical research stage, and future research needs to further consider the newer iterations of IoT terminal devices.
Availability of data and materials
The data used to support the findings of this study is included within the article.
Abbreviations
 IoT:

Internet of things
 ECC:

Elliptic curve cryptography
 SMBR:

Step multibase representation
 NBIoT:

Narrowband Internet of Things
 IFP:

Integer factorisation problems
 DLP:

Discrete logarithm problem
 ECDLP:

Elliptic curve discrete logarithm problem
 NAF:

Nonadjacent form
 JSF:

Joint sparse form
 RTNAF:

\(\tau\)Adic nonadjacent form
 DBNS:

Doublebase number system
 DBC:

Doublebase chain
 MBNR:

Multibase number representation
 SCA:

Sidechannel attacks
 NIST:

National institute of standards and technology
References
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644â€“654 (1976)
V.S. Miller, Use of elliptic curves in cryptography, in Lecture Notes in Computer Sciences 218 on Advances in Cryptologyâ€”CRYPTO 85 (1986), pp. 417â€“426.
N. Koblitz, Elliptic curve cryptosystems. Math. Comput. 48(177), 203â€“209 (1987)
F. Morain, J. Olivos, Speeding up the computations on an elliptic curve using additionsubtraction chains. Inf. Theory Appl. 24, 531â€“543 (1989)
J.A. Solinas, Lowweight binary representations for pairs of integers. Center for Applied Cryptographic Research, University of Waterloo, Waterloo. Research Report CORR 2001â€“41.
N. Koblitz, CM curves with good cryptographic properties, in Advances in Cryptologyâ€”Cryptoâ€™91 (1992), pp. 279â€“287.
J.A. Solinas, Efficient arithmetic on Koblitz curves. Des. Codes Cryptogr. 19(2), 195â€“249 (2000)
H. Cohen, A. Miyaji, T. Ono, Efficient elliptic curve exponentiation using mixed coordinates, in International Conference on the Theory and Application of Cryptology and Information Security (1998), pp. 51â€“65.
V.S. Dimitrov, G. Jullien, W. Miller, Theory and applications of the doublebase number system. IEEE Trans. Comput. 48(10), 1098â€“1106 (1999)
V.S. Dimitrov, L. Imbert, P.K. Mishra, Efficient and secure elliptic curve point multiplication using doublebase chains, in 11th International Conference on the Theory and Application of Cryptology and Information Security (2005), pp. 59â€“78.
P.K. Mishra, V.S. Dimitrov, Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation, in 10th International Conference on Information Security (2007), pp. 390â€“406.
D. Hankerson, J. Lopez Hernandez, A. Menezes, Software implementation of elliptic curve cryptography over binary fields, in 2nd International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000) (2000), pp. 1â€“24.
K. Fong, D. Hankerson, J. Lopez, A. Menezes, Field inversion and point halving revisited. IEEE Trans. Comput. 53(8), 1047â€“1059 (2004)
B. ChevalierMames, M. Ciet, M. Joye, Lowcost solutions for preventing simple sidechannel analysis: sidechannel atomicity. IEEE Trans. Comput. 53(6), 760â€“768 (2004)
E.W. Knudsen, Elliptic scalar multiplication using point halving, in 5th Annual International Conference on the Theory and Application of Cryptology and Information Security (1999), pp. 135â€“149.
R. Schroeppel, Elliptic Curve Point Ambiguity Resolution Apparatus and Method, U. S. Patent 7200225.
M. Ciet, M. Joye, K. Lauter, P.L. Montgomery, Trading inversions for multiplications in elliptic curve cryptography. Des. Codes Cryptogr 39(2), 189â€“206 (2006)
S.M. Cho, S.G. Gwak, C.H. Kim, S. Hong, Faster elliptic curve arithmetic for triplebase chain by reordering sequences of field operations. Multimed. Tools Appl. 75(22), 1â€“13 (2016)
D. Bernstein, P. Birkner, T. Lange, C. Peters, Optimizing doublebase ellipticcurve singlescalar multiplication, in Progress in Cryptologyâ€”INDOCRYPT 2007. Lecture Notes in Computer Science, vol. 4859 (2007), pp. 167â€“182.
G.N. Purohit, A.S. Rawat, K. Manoj, Elliptic curve point multiplication using MBNR and point halving. Int. J. Adv. Netw. Appl. 3(5), 1329â€“1337 (2012)
L. Zhongxi, Z. Tiejun, D. Dongya, Algorithm for directly computing 7p elliptic curves and its application. J. Comput. Appl. 33(7), 1870â€“1874 (2013)
M.I. Abdulwahed, R. Mohamad et al., An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving. Appl. Math. Sci. 4(26), 1259â€“1272 (2010)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (61971014), National Key Research and Development Project of China (2019YFB2102303).
Funding
This work was supported by the National Natural Science Foundation of China (61971014), National Key Research and Development Project of China (2019YFB2102303).
Author information
Authors and Affiliations
Contributions
CG contributed in investigation, the overall design, design of the septuple formula and the scalar multiplication algorithm, result analysis, and draft manuscript writing. BG contributed in methodology, reviewing and editing the manuscript, and funding acquisitions. All the authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
No conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication. I would like to declare on behalf of my coauthors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part. All the authors listed have approved the manuscript that is enclosed.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Guo, C., Gong, B. Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT. J Wireless Com Network 2021, 82 (2021). https://doi.org/10.1186/s13638021019677
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638021019677