Professional Documents
Culture Documents
Example of Cryptography Over The Ring F3d (E) e 2 0
Example of Cryptography Over The Ring F3d (E) e 2 0
Example of Cryptography Over The Ring F3d (E) e 2 0
discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/272681736
CITATIONS READS
0 14
2 authors:
SEE PROFILE
All in-text references underlined in blue are linked to publications on ResearchGate, Available from: Moulay Hachem Hassib
letting you access and read them immediately. Retrieved on: 29 October 2016
Latest Trends in Applied Informatics and Computing
Abstract: In this work we will present an example of cryptography on an elliptic curve defined over the ring
F3d [ε], ε2 = 0.
Key–Words: Elliptic curve, ring, finite ring, finite field, public key, cryptography
A = {a0 + a1 ε | a0 , a1 ∈ F3d }([1], [2], [3]). 2) If [π(X1 ) : π(Y1 ) : π(Z1 )] 6= [π(X2 ) : π(Y2 ) :
π(Z2 )] then :
We consider the elliptic curve over the ring A which
is given by the equation:
X3 = 2X1 Y2 Y1 Z2 + X1 Y2 2 Z1 + 2X2 Y1 2 Z2 +
2 3 2
Y Z = X + aX Z + bZ , 3 X2 Y1 Y2 Z1 + 2aX1 2 X2 Z2 + aX1 X2 2 Z1
F9 = {0, 1, 2, α, α + 1, α + 2, 2α, 2α + 1, 2α + 2}
X3 = Y1 Y22 X1 + Y1 2 Y2 X2 + 2aX1 2 X2 Y2 +
2aX1 X2 2 Y1 + 2Z1 Z2 2 abY1 + 2Z1 2 Z2 abY2 The elliptic curve Ea,b (F9 [ε]) have 126 elements:
Ea,b (F9 [ε]) = {[0 : 1 : 0], [0 : 1 + 2αε : 1], [0 : 2 + αε : 1], [1 : α + 2αε :
ISBN: 978-1-61804-130-2 71
Latest Trends in Applied Informatics and Computing
1], [1 : 2α + αε : 1], [ε : 1 : 0], [ε : 1 + 2αε : 1], [ε : 2 + αε : 1], [(α + 1)ε : 1 : 3 Cryptographic application
0], [(α + 1)ε : 1 + 2αε : 1], [(α + 1)ε : 2 + αε : 1], [(α + 2)ε : 1 : 0], [(α + 2)ε :
1 + 2αε : 1], [(α + 2)ε : 2 + αε : 1], [(2α + 1)ε : 1 : 0], [(2α + 1)ε : 1 + 2αε : We will give a code to each element Q = mP ∈ G
1], [(2α + 1)ε : 2 + αε : 1], [(2α + 2)ε : 1 : 0], [(2α + 2)ε : 1 + 2αε : where m ∈ {1, . . . , 42} defined as it follows:
1], [(2α + 2)ε : 2 + αε : 1], [αε : 1 : 0], [αε : 1 + 2αε : 1], [αε : 2 + αε : if Q = [x0 + x1 ε : y0 + y1 ε : z0 ] where
1], [2ε : 1 : 0], [2ε : 1+2αε : 1], [2ε : 2+αε : 1], [2αε : 1 : 0], [2αε : 1+2αε : x0 , x1 , y0 , y1 , z0 ∈ F9 and z0 = 0 or 1. And since
1], [2αε : 2 + αε : 1], [1 + ε : α + (α + 2)ε : 1], [1 + ε : 2α + (2α + 1)ε : (1, α) is a base of the vector space F9 over F3 so:
1], [1 + 2ε : α + ε : 1], [1 + 2ε : 2α + 2ε : 1], [1 + (α + 1)ε : α + (2α + 1)ε : x0 = c0 + c1 α
1], [1 + (α + 1)ε : 2α + (α + 2)ε : 1], [1 + (α + 2)ε : α + αε : 1], [1 + (α + 2)ε : x1 = c2 + c3 α
2α + 2αε : 1], [1 + (2α + 1)ε : 2α : 1], [1 + (2α + 1)ε : α : 1], [1 + (2α + 2)ε : y0 = c4 + c5 α
α+(2α+2)ε : 1], [1+(2α+2)ε : 2α+(α+1)ε : 1], [1+αε : α+2ε : 1], [1+αε : y1 = c6 + c7 α,
2α + ε : 1], [1 + 2αε : α + (α + 1)ε : 1], [1 + 2αε : 2α + (2α + 2)ε : 1], [α + 1 : where ci ∈ F3 for all i = 0 . . . 7. Then we code Q as
α + (α + 1)ε : 1], [α + 1 : 2α + (2α + 2)ε : 1], [α + 2 : α + (α + 2)ε : 1], [α + 2 : it follows:
2α + (2α + 1)ε : 1], [α + ε : α + 1 + (α + 2)ε : 1], [α + ε : 2α + 2 + (2α + 1)ε :
If z0 = 0, then: Q = c0 c1 c2 c3 c4 c5 c6 c7 0.
1], [α + 2ε : α + 1 + ε : 1], [α + 2ε : 2α + 2 + 2ε : 1], [α + (α + 1)ε :
ISBN: 978-1-61804-130-2 72
Latest Trends in Applied Informatics and Computing
ISBN: 978-1-61804-130-2 73