Twisted Hessian Curves
   HOME

TheInfoList



OR:

In
mathematics Mathematics is a field of study that discovers and organizes methods, Mathematical theory, theories and theorems that are developed and Mathematical proof, proved for the needs of empirical sciences and mathematics itself. There are many ar ...
, twisted Hessian curves are a generalization of Hessian curves; they were introduced in
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys to provide equivalent security, compared to cryptosystems based on modula ...
to speed up the addition and doubling formulas and to have strongly unified arithmetic. In some operations (see the last sections), it is close in speed to
Edwards curve In mathematics, the Edwards curves are a family of elliptic curves studied by Harold Edwards (mathematician), Harold Edwards in 2007. The concept of elliptic curves over finite fields is widely used in elliptic curve cryptography. Applications ...
s. Twisted Hessian curves were introduced by Bernstein, Lange, and Kohel.


Definition

Let be a
field Field may refer to: Expanses of open ground * Field (agriculture), an area of land used for agricultural purposes * Airfield, an aerodrome that lacks the infrastructure of an airport * Battlefield * Lawn, an area of mowed grass * Meadow, a grass ...
. The twisted Hessian form in ''
affine coordinates In mathematics, an affine space is a geometric structure that generalizes some of the properties of Euclidean spaces in such a way that these are independent of the concepts of distance and measure of angles, keeping only the properties related ...
'' is given by: a\cdot x^3+y^3+1=d\cdot x\cdot y and in ''
projective coordinates In mathematics, homogeneous coordinates or projective coordinates, introduced by August Ferdinand Möbius in his 1827 work , are a system of coordinates used in projective geometry, just as Cartesian coordinates are used in Euclidean geometry. T ...
'' by a\cdot X^3+Y^3+Z^3=d\cdot X\cdot Y\cdot Z, where and and . These curves are
birationally equivalent In mathematics, birational geometry is a field of algebraic geometry in which the goal is to determine when two algebraic varieties are isomorphic outside lower-dimensional subsets. This amounts to studying mappings that are given by rational fu ...
to Hessian curves, and Hessian curves are just the special case of twisted Hessian curves in which . Considering the equation , note that, if has a cube root in , then there exists a unique such that ; otherwise, it is necessary to consider an
extension field In mathematics, particularly in algebra, a field extension is a pair of fields K \subseteq L, such that the operations of ''K'' are those of ''L'' restricted to ''K''. In this case, ''L'' is an extension field of ''K'' and ''K'' is a subfield of ...
of , such as . Then, since , defining , the following equation is needed (in Hessian form) to do the transformation: t^3+y^3+1=d\cdot x\cdot y . This means that twisted Hessian curves are birationally equivalent to elliptic curves in
Weierstrass form In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If the ...
.


Group law

It is interesting to analyze the group law of the elliptic curve, defining the addition and doubling formulas (because the
simple power analysis Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the ...
and
differential power analysis Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
attacks are based on the running time of these operations). In general, the group law is defined in the following way: if three points lies in the same line then they sum up to zero. So, by this property, the explicit formulas for the group law depend on the curve shape. Let be a point; its inverse is then in the plane. In projective coordinates, let be a point; then is its inverse. Furthermore, the
neutral element In mathematics, an identity element or neutral element of a binary operation is an element that leaves unchanged every element when the operation is applied. For example, 0 is an identity element of the addition of real numbers. This concept is use ...
in affine plane is , and in projective coordinates it is . In some applications of elliptic curves for
cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
and
integer factorization In mathematics, integer factorization is the decomposition of a positive integer into a product of integers. Every positive integer greater than 1 is either the product of two or more integer factors greater than 1, in which case it is a comp ...
, it is necessary to compute
scalar multiple In mathematics, scalar multiplication is one of the basic operations defining a vector space in linear algebra (or more generally, a module in abstract algebra). In common geometrical contexts, scalar multiplication of a real Euclidean vector ...
s of , say for some
integer An integer is the number zero (0), a positive natural number (1, 2, 3, ...), or the negation of a positive natural number (−1, −2, −3, ...). The negations or additive inverses of the positive natural numbers are referred to as negative in ...
, and they are based on the double-and-add method, so the addition and doubling formulas are needed. Using affine coordinates, the addition and doubling formulas for this
elliptic curve In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If the ...
are as follows.


Addition formulas

Let and ; then, , where x_3=\frac y_3=\frac


Doubling formulas

Let ; then , where x_1=\frac y_1=\frac


Algorithms and examples

Here some efficient algorithms of the addition and doubling law are given; they can be important in cryptographic computations, and the projective coordinates are used to this purpose.


Addition

A = X_1\cdot Z_2 B = Z_1\cdot Z_2 C = Y_1X_2 D = Y_1\cdot Y_2 E = Z_1\cdot Y_2 F = a\cdot X_1\cdot X_2 X_3 = A\cdot B-C\cdot D Y_3 = D\cdot E-F\cdot A Z_3 = F\cdot C-B\cdot E The cost of this algorithm is 12 multiplications, one multiplication by a constant, and 3 additions. Example: Let and be points over a twisted Hessian curve with . Then is given by: A=-1; B=-1; C=-1; D=-1; E=1; F=2; :x_3=0 :y_3=-3 :z_3=-3 That is, .


Doubling

D = X_1^3 E = Y_1^3 F = Z_1^3 G = a\cdot D X_3 = X_1\cdot (E-F) Y_3 = Z_1\cdot (G-E) Z_3 = Y_1\cdot (F-G) The cost of this algorithm is 3 multiplications, one multiplication by a constant, 3 additions, and 3 cubings. This is the best result obtained for this curve. Example: Let be a point over the curve defined by as above; then, is given by: D=1; E=-1; F=1; G=-4; :x_3=-2 :y_3=-3 :z_3=-5 That is, .


See also

*
Table of costs of operations in elliptic curves Elliptic curve cryptography is a popular form of public key encryption that is based on the mathematical theory of elliptic curves. Points on an elliptic curve can be added and form a group under this addition operation. This article describes th ...


External links

* http://hyperelliptic.org/EFD/g1p/index.html


References

* http://hyperelliptic.org/EFD/g1p/auto-twistedhessian.html {{DEFAULTSORT:Twisted Hessian Curves Elliptic curves Elliptic curve cryptography