In
mathematics, the Twisted Hessian curve represents a generalization of
Hessian curves; it was introduced in
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
to speed up the addition and doubling formulas and to have strongly unified arithmetic. In some operations (see the last sections), it is close in speed to
Edwards curve
In mathematics, the Edwards curves are a family of elliptic curves studied by Harold Edwards in 2007. The concept of elliptic curves over finite fields is widely used in elliptic curve cryptography. Applications of Edwards curves to cryptogra ...
s.
Definition
Let ''K'' be a
field
Field may refer to:
Expanses of open ground
* Field (agriculture), an area of land used for agricultural purposes
* Airfield, an aerodrome that lacks the infrastructure of an airport
* Battlefield
* Lawn, an area of mowed grass
* Meadow, a grass ...
. According to
twisted Hessian curves were introduced by
Bernstein, Lange,
and Kohel.
The twisted Hessian form in ''
affine coordinates
In mathematics, an affine space is a geometric structure that generalizes some of the properties of Euclidean spaces in such a way that these are independent of the concepts of distance and measure of angles, keeping only the properties relate ...
'' is given by:
and in ''
projective coordinates
In mathematics, homogeneous coordinates or projective coordinates, introduced by August Ferdinand Möbius in his 1827 work , are a system of coordinates used in projective geometry, just as Cartesian coordinates are used in Euclidean geometry. Th ...
'':
where
and
and ''a'', ''d'' in ''K''
Note that these curves are
birationally equivalent
In mathematics, birational geometry is a field of algebraic geometry in which the goal is to determine when two algebraic varieties are isomorphic outside lower-dimensional subsets. This amounts to studying mappings that are given by rational ...
to
Hessian curves.
The Hessian curve is just a special case of Twisted Hessian curve, with a=1.
Considering the equation ''a'' · ''x''
3 + ''y''
3 + 1 = ''d'' · ''x'' · ''y'', note that:
if ''a'' has a cube root in ''K'', there exists a unique ''b'' such that ''a'' = ''b''
3.Otherwise, it is necessary to consider an
extension field
In mathematics, particularly in algebra, a field extension is a pair of fields E\subseteq F, such that the operations of ''E'' are those of ''F'' restricted to ''E''. In this case, ''F'' is an extension field of ''E'' and ''E'' is a subfield of ...
of ''K'' (e.g., ''K''(''a''
1/3)). Then, since ''b''
3 · ''x''
3 = ''bx''
3, defining ''t'' = ''b'' · ''x'', the following equation is needed (in Hessian form) to do the transformation:
.
This means that Twisted Hessian curves are birationally equivalent to elliptic curve in
Weierstrass form.
Group law
It is interesting to analyze the
group law of the elliptic curve, defining the addition and doubling formulas (because the
simple power analysis
Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
and
differential power analysis
Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
attacks are based on the running time of these operations). In general, the group law is defined in the following way: if three points lies in the same line then they sum up to zero. So, by this property, the
explicit formulas for the group law depend on the curve shape.
Let ''P'' = (''x''
1, ''y''
1) be a point, then its inverse is −''P'' = (''x''
1/''y''
1, 1/''y''
1) in the plane.
In projective coordinates, let ''P'' = (''X'' : ''Y'' : ''Z'') be one point, then −''P'' = (''X''
1/''Y''
1 : 1/''Y''
1 : ''Z'') is the inverse of P.
Furthermore, the
neutral element
In mathematics, an identity element, or neutral element, of a binary operation operating on a set is an element of the set that leaves unchanged every element of the set when the operation is applied. This concept is used in algebraic structures ...
(in affine plane) is: θ = (0, −1) and in projective coordinates: θ = (0 : −1 : 1).
In some applications of
elliptic curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
and the elliptic curve method of
integer factorization (
ECM
ECM may refer to:
Economics and commerce
* Engineering change management
* Equity capital markets
* Error correction model, an econometric model
* European Common Market
Mathematics
* Elliptic curve method
* European Congress of Mathematics
...
) it is necessary to compute the
scalar multiplication
In mathematics, scalar multiplication is one of the basic operations defining a vector space in linear algebra (or more generally, a module in abstract algebra). In common geometrical contexts, scalar multiplication of a real Euclidean vector ...
s of ''P'', say ''
'' for some
integer
An integer is the number zero (), a positive natural number (, , , etc.) or a negative integer with a minus sign ( −1, −2, −3, etc.). The negative numbers are the additive inverses of the corresponding positive numbers. In the language ...
''n'', and they are based on the
double-and-add method; so the addition and doubling formulas are needed.
The addition and doubling formulas for this
elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If ...
can be defined, using the affine coordinates to simplify the notation:
Addition formulas
Let ''p'' = (''x''
1, ''y''
1) and ''Q'' = (''x''
2, ''y''
2); then, ''R'' = ''P'' + ''Q'' = (''x''
3, ''y''
3) is given by the following equations:
Doubling formulas
Let ''P'' = (''x'', ''y''); then
'P'' = (''x''
1, ''y''
1) is given by the following equations:
Algorithms and examples
Here some efficient algorithms of the addition and doubling law are given; they can be important in cryptographic computations, and the projective coordinates are used to this purpose.
Addition
The cost of this algorithm is 12 multiplications, one multiplication by a (constant) and 3 additions.
Example:
let ''P''
1 = (1 : −1 : 1) and ''P''
2 = (−2 : 1 : 1) be points over a twisted Hessian curve with a=2 and d=-2.Then ''R'' = ''P''
1 + ''P''
2 is given by:
:
:
:
That is, ''R''= (0 : −3 : −3).
Doubling
The cost of this algorithm is 3 multiplications, one multiplication by constant, 3 additions and 3 cube powers.
This is the best result obtained for this curve.
Example:
let ''P'' = (1 : −1 : 1) be a point over the curve defined by a=2 and d=-2 as above, then ''R'' =
'P'' = (''x''
3 : ''y''
3 : ''z''
3) is given by:
:
:
:
That is ''R'' = (−2 : −3 : 5).
See also
*
Table of costs of operations in elliptic curves
Elliptic curve cryptography is a popular form of public key encryption that is based on the mathematical theory of elliptic curves. Points on an elliptic curve can be added and form a group under this addition operation. This article describe ...
External links
* http://hyperelliptic.org/EFD/g1p/index.html
References
* http://hyperelliptic.org/EFD/g1p/auto-twistedhessian.html
{{DEFAULTSORT:Twisted Hessian Curves
Elliptic curves
Elliptic curve cryptography