HOME

TheInfoList



OR:

In mathematics, the Twisted Hessian curve represents a generalization of Hessian curves; it was introduced in
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
to speed up the addition and doubling formulas and to have strongly unified arithmetic. In some operations (see the last sections), it is close in speed to
Edwards curve In mathematics, the Edwards curves are a family of elliptic curves studied by Harold Edwards in 2007. The concept of elliptic curves over finite fields is widely used in elliptic curve cryptography. Applications of Edwards curves to cryptogra ...
s.


Definition

Let ''K'' be a
field Field may refer to: Expanses of open ground * Field (agriculture), an area of land used for agricultural purposes * Airfield, an aerodrome that lacks the infrastructure of an airport * Battlefield * Lawn, an area of mowed grass * Meadow, a grass ...
. According to twisted Hessian curves were introduced by Bernstein, Lange, and Kohel. The twisted Hessian form in ''
affine coordinates In mathematics, an affine space is a geometric structure that generalizes some of the properties of Euclidean spaces in such a way that these are independent of the concepts of distance and measure of angles, keeping only the properties relate ...
'' is given by: a\cdot x^3+y^3+1=d\cdot x\cdot y and in ''
projective coordinates In mathematics, homogeneous coordinates or projective coordinates, introduced by August Ferdinand Möbius in his 1827 work , are a system of coordinates used in projective geometry, just as Cartesian coordinates are used in Euclidean geometry. Th ...
'': a\cdot X^3+Y^3+Z^3=d\cdot X\cdot Y\cdot Z where x=\frac and y=\frac and ''a'', ''d'' in ''K'' Note that these curves are
birationally equivalent In mathematics, birational geometry is a field of algebraic geometry in which the goal is to determine when two algebraic varieties are isomorphic outside lower-dimensional subsets. This amounts to studying mappings that are given by rational ...
to Hessian curves. The Hessian curve is just a special case of Twisted Hessian curve, with a=1. Considering the equation ''a'' · ''x''3 + ''y''3 + 1 = ''d'' · ''x'' · ''y'', note that: if ''a'' has a cube root in ''K'', there exists a unique ''b'' such that ''a'' = ''b''3.Otherwise, it is necessary to consider an
extension field In mathematics, particularly in algebra, a field extension is a pair of fields E\subseteq F, such that the operations of ''E'' are those of ''F'' restricted to ''E''. In this case, ''F'' is an extension field of ''E'' and ''E'' is a subfield of ...
of ''K'' (e.g., ''K''(''a''1/3)). Then, since ''b''3 · ''x''3 = ''bx''3, defining ''t'' = ''b'' · ''x'', the following equation is needed (in Hessian form) to do the transformation: t^3+y^3+1=d\cdot x\cdot y . This means that Twisted Hessian curves are birationally equivalent to elliptic curve in Weierstrass form.


Group law

It is interesting to analyze the group law of the elliptic curve, defining the addition and doubling formulas (because the
simple power analysis Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
and
differential power analysis Power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of the device: semiconductor devices are governed by the l ...
attacks are based on the running time of these operations). In general, the group law is defined in the following way: if three points lies in the same line then they sum up to zero. So, by this property, the explicit formulas for the group law depend on the curve shape. Let ''P'' = (''x''1, ''y''1) be a point, then its inverse is −''P'' = (''x''1/''y''1, 1/''y''1) in the plane. In projective coordinates, let ''P'' = (''X'' : ''Y'' : ''Z'') be one point, then −''P'' = (''X''1/''Y''1 : 1/''Y''1 : ''Z'') is the inverse of P. Furthermore, the
neutral element In mathematics, an identity element, or neutral element, of a binary operation operating on a set is an element of the set that leaves unchanged every element of the set when the operation is applied. This concept is used in algebraic structures ...
(in affine plane) is: θ = (0, −1) and in projective coordinates: θ = (0 : −1 : 1). In some applications of
elliptic curve cryptography Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC allows smaller keys compared to non-EC cryptography (based on plain Galois fields) to provide e ...
and the elliptic curve method of integer factorization (
ECM ECM may refer to: Economics and commerce * Engineering change management * Equity capital markets * Error correction model, an econometric model * European Common Market Mathematics * Elliptic curve method * European Congress of Mathematics ...
) it is necessary to compute the
scalar multiplication In mathematics, scalar multiplication is one of the basic operations defining a vector space in linear algebra (or more generally, a module in abstract algebra). In common geometrical contexts, scalar multiplication of a real Euclidean vector ...
s of ''P'', say '' '' for some
integer An integer is the number zero (), a positive natural number (, , , etc.) or a negative integer with a minus sign ( −1, −2, −3, etc.). The negative numbers are the additive inverses of the corresponding positive numbers. In the language ...
''n'', and they are based on the double-and-add method; so the addition and doubling formulas are needed. The addition and doubling formulas for this
elliptic curve In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point . An elliptic curve is defined over a field and describes points in , the Cartesian product of with itself. If ...
can be defined, using the affine coordinates to simplify the notation:


Addition formulas

Let ''p'' = (''x''1, ''y''1) and ''Q'' = (''x''2, ''y''2); then, ''R'' = ''P'' + ''Q'' = (''x''3, ''y''3) is given by the following equations: x_3=\frac y_3=\frac


Doubling formulas

Let ''P'' = (''x'', ''y''); then 'P'' = (''x''1, ''y''1) is given by the following equations: x_1=\frac y_1=\frac


Algorithms and examples

Here some efficient algorithms of the addition and doubling law are given; they can be important in cryptographic computations, and the projective coordinates are used to this purpose.


Addition

A = X_1\cdot Z_2 B = Z_1\cdot Z_2 C = Y_1X_2 D = Y_1\cdot Y_2 E = Z_1\cdot Y_2 F = a\cdot X_1\cdot X_2 X_3 = A\cdot B-C\cdot D Y_3 = D\cdot E-F\cdot A Z_3 = F\cdot C-B\cdot E The cost of this algorithm is 12 multiplications, one multiplication by a (constant) and 3 additions. Example: let ''P''1 = (1 : −1 : 1) and ''P''2 = (−2 : 1 : 1) be points over a twisted Hessian curve with a=2 and d=-2.Then ''R'' = ''P''1 + ''P''2 is given by: A=-1; B=-1; C=-1; D=-1; E=1; F=2; :x_3=0 :y_3=-3 :z_3=-3 That is, ''R''= (0 : −3 : −3).


Doubling

D = X_1^3 E = Y_1^3 F = Z_1^3 G = a\cdot D X_3 = X_1\cdot (E-F) Y_3 = Z_1\cdot (G-E) Z_3 = Y_1\cdot (F-G) The cost of this algorithm is 3 multiplications, one multiplication by constant, 3 additions and 3 cube powers. This is the best result obtained for this curve. Example: let ''P'' = (1 : −1 : 1) be a point over the curve defined by a=2 and d=-2 as above, then ''R'' = 'P'' = (''x''3 : ''y''3 : ''z''3) is given by: D=1; E=-1; F=1; G=-4; :x_3=-2 :y_3=-3 :z_3=-5 That is ''R'' = (−2 : −3 : 5).


See also

*
Table of costs of operations in elliptic curves Elliptic curve cryptography is a popular form of public key encryption that is based on the mathematical theory of elliptic curves. Points on an elliptic curve can be added and form a group under this addition operation. This article describe ...


External links

* http://hyperelliptic.org/EFD/g1p/index.html


References

* http://hyperelliptic.org/EFD/g1p/auto-twistedhessian.html {{DEFAULTSORT:Twisted Hessian Curves Elliptic curves Elliptic curve cryptography