# Patent application title: XZ-ELLIPTIC CURVE CRYPTOGRAPHY SYSTEM AND METHOD

##
Inventors:
Lahouari Ghouti (Dhahran, SA)
Mohammad K. Ibrahim (Leicester, GB)
Abdulaziz M. Al-Khoraidly (Onaizah, SA)

Assignees:
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS

IPC8 Class: AH04L928FI

USPC Class:
380 28

Class name: Cryptography particular algorithmic function encoding

Publication date: 2013-08-08

Patent application number: 20130202104

## Abstract:

The XZ-elliptic curve cryptography system and method provides a
computerized method that allows for the encryption of messages through
elliptic polynomial cryptography and, particularly, with the embedding of
either a symmetric secret key or a public key in the message bit string.
The method of performing XZ-elliptic polynomial cryptography is based on
the elliptic polynomial discrete logarithm problem. It is well known that
an elliptic polynomial discrete logarithm problem is a computationally
"difficult" or "hard" problem.## Claims:

**1.**A computerized method of performing XZ-elliptic curve cryptography, comprising the steps of: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}; (b) the sending correspondent and the receiving correspondent further agreeing upon a random scalar k and a random shared secret key for communication E

_{s}, and agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}; the sending correspondent then performs the following steps: (c) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}); (d) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk}, Y

_{Bk},Z

_{Bk})=k(X

_{B},Y

_{B},Z

_{B}); (e) computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c}, Y

_{c},Z

_{c})=(X

_{m},Y

_{m},Z

_{m})+k(X

_{B},Y

_{B},Z

_{B}); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{CE}

_{s}and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively; (h) calculating a cipher transformation index E

_{c}as E c = E s E m ; ##EQU00056## (i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent; the receiving correspondent then performs the following steps: (j) calculating the data transformation index E

_{m}as E m = E s E c ; ##EQU00057## (k) calculating the cipher point coordinates X

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{CE}

_{s}

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (l) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk}, Y

_{Bk},Z

_{Bk})=k(X

_{b}, Y

_{B},Z

_{B}); (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k(X

_{B},Y

_{B},- Z

_{B}); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

**2.**The computerized method of performing XZ-elliptic curve cryptography as recited in claim 1, wherein each said step of embedding includes the steps of: (a) defining the respective message bit string as an M-bit string, wherein M is an integer such that (3N-L)>M>(2N-L), where L is an integer, N represents a number of bits used to represent F(p) elements, F(p) representing a finite field containing the elliptic curve set EC

^{3}, wherein p represents a set of points on EC

^{3}; (b) dividing the respective message bit string into three strings m

_{1}, m

_{2}and m

_{3}, wherein the length of string m, is less than or equal to (N-L) bits, the length of string m

_{2}is less than or equal to (N-1) bits, and the length of string mg is less than or equal to N bits; (c) assigning the value of the bit string m

_{3}to E

_{m}; (d) assigning the value of the bit string m

_{2}to Z

_{m}by first assigning the value of the bit string m

_{2}to R

_{m}, then using a Legendre test to determine if R

_{m}has a square root, and then, if R

_{m}has a square root, setting Z

_{m}=R

_{m}and if R

_{m}does not have a square root, then setting Z

_{m}=gR

_{m}, wherein g is non-quadratic residue in F(p); (e) computing aZ

_{m}

^{2}and bZ

_{m}

^{3}, wherein a and b are selected scalars; (f) assigning the value of the bit string m

_{1}to X

_{m}; (g) computing a value T as T=X

_{m}

^{3}+(aZ

_{m}

^{2})X

_{m}+(bZ

_{m}

^{3}) and using a Legendre test to determine if T has a square root; and (h) assigning the square root of T to Y

_{m}if T has a square root, and incrementally increasing X

_{m}and returning to step (g) if T does not have a square root.

**3.**The computerized method of performing XZ-elliptic curve cryptography as recited in claim 2, wherein p is selected prior to encryption.

**4.**The computerized method of performing XZ-elliptic curve cryptography as recited in claim 3, wherein g is selected to be -1 if p≡3 mod 4 or p≡1 mod

**4.**

**5.**The computerized method of performing XZ-elliptic curve cryptography as recited in claim 4, wherein the shared secret key for communication E

_{s}and the data transformation index E

_{m}are selected to be powers of a common base μ.

**6.**The computerized method of performing XZ-elliptic curve cryptography as recited in claim 5, wherein the common base μ is selected to be a power of two.

**7.**A computerized method of performing XZ-elliptic curve cryptography with a public key, comprising the steps of: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}, the sending correspondent further establishing a private key pair (k

_{SPr},e

_{SPr}); (b) the sending correspondent and the receiving correspondent further agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}and sharing a public key pair (k

_{SPr}(X

_{B},Y

_{B}, Z

_{B}),E

_{b}

^{e}.sup.SPr); the sending correspondent then performs the following steps: (c) calculating a shared key as (k

_{SPr}k

_{RPr}(X

_{B},Y

_{B},Z

_{B})), (E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr); (d) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}); (e) computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m},Y

_{m},Z

_{m})+k

_{SPr}(k

_{RPr}(X-

_{B},Y

_{B},Z

_{B})); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{C}(E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively; (h) calculating a cipher transformation index E

_{c}as E c = ( E b e RPr ) e SPr E m ; ##EQU00058## (i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent; the receiving correspondent then performs the following steps: (j) calculating the shared key as (k

_{RPr}(k

_{SPr}(X

_{B},Y

_{B},Z

_{B})),(E

_{b}

^{e}.sup.SPr)

^{e}

^{RP}- r); (k) calculating the data transformation index E

_{m}as E m = ( E b e RPr ) e SPr E c ; ##EQU00059## (l) calculating the cipher point coordinates X

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{C}((E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr)

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k

_{RPr}(k

_{SPr}(X-

_{B},Y

_{B},Z

_{B})); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

**8.**The computerized method of performing XZ-elliptic curve cryptography with a public key as recited in claim 7, wherein the step of embedding includes the steps of: (a) defining the respective message bit string as an M-bit string, wherein M is an integer such that (3N-L)>M>(2N-L), where L is an integer, N represents a number of bits used to represent F(p) elements, F(p) representing a finite field containing the elliptic curve set EC

^{3}, wherein p represents a set of points on EC

^{3}; (b) dividing the respective message bit string into three strings m

_{1}, m

_{2}and m

_{3}, wherein the length of string m

_{1}is less than or equal to (N-L) bits, the length of string m

_{2}is less than or equal to (N-1) bits, and the length of string m

_{3}is less than or equal to N bits; (c) assigning the value of the bit string m

_{3}to E

_{m}; (d) assigning the value of the bit string m

_{2}to Z

_{m}by first assigning the value of the bit string m

_{2}to R

_{m}, then using a Legendre test to determine if R

_{m}has a square root, and then, if R

_{m}has a square root, setting Z

_{m}=R

_{m}and if R

_{m}does not have a square root, then setting Z

_{m}=gR

_{m}, wherein g is non-quadratic residue in F(p); (e) computing aZ

_{m}

^{2}and bZ

_{m}

^{3}, wherein a and b are selected scalars; (f) assigning the value of the bit string m

_{1}to X

_{m}; (g) computing a value T as T=X

_{m}

^{3}+(aZ

_{m}

^{2})X

_{m}+(bZ

_{m}

^{3}) and using a Legendre test to determine if Thas a square root; and (h) assigning the square root of T to Y

_{m}if T has a square root, and incrementally increasing X

_{m}and returning to step (g) if T does not have a square root.

**9.**The computerized method of performing XZ-elliptic curve cryptography with a public key as recited in claim 8, wherein p is selected prior to encryption.

**10.**The computerized method of performing XZ-elliptic curve cryptography with a public key as recited in claim 9, wherein g is selected to be -1 if p≡3 mod 4 or p≡1 mod

**4.**

**11.**The computerized method of performing XZ-elliptic curve cryptography with a public key as recited in claim 10, wherein the shared number E

_{b}and the data transformation index E

_{m}are selected to be powers of a common base μ.

**12.**The computerized method of performing XZ-elliptic curve cryptography with a public key as recited in claim 11, wherein the common base μ is selected to be a power of two.

**13.**A system for performing XZ-elliptic curve cryptography, wherein a sending correspondent and a receiving correspondent select and agree upon an elliptic curve set EC

^{3}, wherein the sending correspondent further establishes a private key pair (k

_{SPr},e

_{SPr}), the sending correspondent and the receiving correspondent further agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}and sharing a public key pair (k

_{SPr}(X

_{B},Y

_{B},Z

_{B}),E

_{b}

^{e}.sup.SPr), the system comprising: a processor; computer readable memory coupled to the processor; a user interface coupled to the processor; a display coupled to the processor; software stored in the memory and executable by the processor, the software having: means for calculating a shared key as (k

_{SPr}(k

_{RPr}(X

_{B},Y

_{B},Z

_{B})),(E

_{b}

^{e}

^{RP}r).su- p.es.sup.SPr) at the sending correspondent; means for embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) at the sending correspondent; means for computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m}Y

_{m},Z

_{m})+k

_{SPr}(k

_{RPr}(X.- sub.B,Y

_{B},Z

_{B})) at the sending correspondent; means for embedding a second secret message bit string into a data transformation index E

_{m}at the sending correspondent; means for transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{C}(E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively, at the sending correspondent; means for calculating a cipher transformation index E

_{c}as E c = ( E b e RPr ) e SPr E m ##EQU00060## at the sending correspondent; means for sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent; means for calculating the shared key as (k

_{RPr}(k

_{SPr}(X

_{B},Y

_{B},Z

_{B})),(E

_{b}

^{e}.sup.SPr).su- p.e

^{RP}r) at the receiving correspondent; means for calculating the data transformation index E

_{m}as E m = ( E b e RPr ) e SPr E c ##EQU00061## at the receiving correspondent; means for calculating the cipher point coordinates X

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{C}((E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr).sup.- and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively, at the receiving correspondent; means for computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m}, Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k

_{Rpr}(k

_{SPr}(X

_{B},Y.- sub.B,Z

_{B})) at the receiving correspondent; and means for retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

## Description:

**BACKGROUND OF THE INVENTION**

**[0001]**1. Field of the Invention

**[0002]**The present invention relates to computerized cryptographic systems and methods for encrypting communications in a computer network or electronic communications system, and particularly to a computerized method of performing XZ-elliptic curve cryptography and cryptographic devices incorporating the method.

**[0003]**2. Description of the Related Art

**[0004]**In recent years, the Internet community has experienced explosive and exponential growth. Given the vast and increasing magnitude of this community, both in terms of the number of individual users and web sites, and the sharply reduced costs associated with electronically communicating information, such as e-mail messages and electronic files, between one user and another, as well as between any individual client computer and a web server, electronic communication, rather than more traditional postal mail, is rapidly becoming a medium of choice for communicating information. The Internet, however, is a publicly accessible network, and is thus not secure. The Internet has been, and increasingly continues to be, a target of a wide variety of attacks from various individuals and organizations intent on eavesdropping, intercepting and/or otherwise compromising or even corrupting message traffic flowing on the Internet, or further illicitly penetrating sites connected to the Internet.

**[0005]**Encryption by itself provides no guarantee that an enciphered message cannot or has not been compromised during transmission or storage by a third party. Encryption does not assure integrity due to the fact that an encrypted message could be intercepted and changed, even though it may be, in any instance, practically impossible, to cryptanalyze. In this regard, the third party could intercept, or otherwise improperly access, a ciphertext message, then substitute a predefined illicit ciphertext block(s), which that party, or someone else acting in concert with that party, has specifically devised for a corresponding block(s) in the message. The intruding party could thereafter transmit the resulting message with the substituted ciphertext block(s) to the destination, all without the knowledge of the eventual recipient of the message.

**[0006]**The field of detecting altered communication is not confined to Internet messages. With the burgeoning use of stand-alone personal computers, individuals or businesses often store confidential information within the computer, with a desire to safeguard that information from illicit access and alteration by third parties. Password controlled access, which is commonly used to restrict access to a given computer and/or a specific file stored thereon, provides a certain, but rather rudimentary, form of file protection. Once password protection is circumvented, a third party can access a stored file and then change it, with the owner of the file then being completely oblivious to any such change.

**[0007]**Methods of adapting discrete logarithm based algorithms to the setting of elliptic polynomials are known. However, finding discrete logarithms in this kind of group is particularly difficult. Thus, elliptic polynomial-based cryptographic algorithms can be implemented using much smaller numbers than in a finite-field setting of comparable cryptographic strength. Therefore, the use of elliptic polynomial cryptography is an improvement over finite field-based public-key cryptography.

**[0008]**In practice, an elliptic curve group over a finite field F is formed by choosing a pair of a and b coefficients, which are elements within F. The group consists of a finite set of points P(x,y) that satisfy the elliptic curve equation:

**F**(x,y)=y

^{2}-x

^{3}-ax-b=0, 1)

**together with a point at infinity**, O. The coordinates of the point, x and y, are elements of F represented in N-bit strings. In the following, a point is either written as a capital letter (e.g., point P) or as a pair in terms of the affine coordinates; i.e. (x,y).

**[0009]**The elliptic curve cryptosystem relies upon the difficulty of the elliptic curve discrete logarithm problem (ECDLP) to provide its effectiveness as a cryptosystem. Using multiplicative notation, the problem can be described as: given points B and Q in the group, find a number k such that B

^{k}=Q, where k is the discrete logarithm of Q to the base B. Using additive notation, the problem becomes: given two points B and Q in the group, find a number k such that kB=Q.

**[0010]**In an elliptic curve cryptosystem, the large integer k is kept private and is often referred to as the secret key. The point Q and the point B are made public, and are referred to as the public key. The security of the system, thus, relies upon the difficulty of deriving the secret k, knowing the public points B and Q. The main factor that determines the security strength of such a system is the size of its underlying finite field. In a real cryptographic application, the underlying field is made so large that it is computationally infeasible to determine k in a straightforward way by computing all the multiples of B until Q is found.

**[0011]**At the heart of elliptic curve geometric arithmetic is scalar multiplication, which computes kB by adding together k copies of the point B. Scalar multiplication is performed through a combination of point-doubling and point-addition operations. The point-addition operations add two distinct points together, and the point-doubling operations add two copies of a point together. To compute, for example, B=(2×(2×(2B)))+2B=Q, it would take three point-doublings and two point-additions.

**[0012]**Addition of two points on an elliptic curve is calculated as follows. When a straight line is drawn through the two points, the straight line intersects the elliptic curve at a third point. The point symmetric to this third intersecting point with respect to the x-axis is defined as a point resulting from the addition. Doubling a point on an elliptic curve is calculated as follows. When a tangent line is drawn at a point on an elliptic curve, the tangent line intersects the elliptic curve at another point. The point symmetric to this intersecting point with respect to the x-axis is defined as a point resulting from the doubling.

**[0013]**Table 1 illustrates the addition rules for adding two points (x

_{1}, y

_{1}) and (x

_{2}, y

_{2}), i.e., (x

_{3}, y

_{3})=(x

_{1}, y

_{1})+(x

_{2}, y

_{2}):

**TABLE**-US-00001 TABLE 1 Summary of Addition Rules: (x

_{3}, y

_{3}) = (x

_{1}, y

_{1}) + (x

_{2}, y

_{2}) General Equations x

_{3}= m

^{2}- x

_{2}- x y

_{3}= m (x

_{3}- x

_{1}) + y

_{1}Point Addition m = y 2 - y 1 x 2 - x 1 ##EQU00001## Point Doubling (x

_{3}, y

_{3}) = 2(x

_{1}, y

_{1}) m = 3 x 1 2 - a 2 y 1 ##EQU00002## (x

_{2}, y

_{2}) = -(x

_{1}, y

_{1}) (x

_{3}, y

_{3}) = (x

_{1}, y

_{1}) + (-(x

_{2}, y

_{2})) = O (x

_{2}, y

_{2}) = O (x

_{3}, y

_{3}) = (x

_{1}, y

_{1}) + O = (x

_{1}, y

_{1}) -(x

_{1}, y

_{1}) = (x

_{1}, -y

_{1})

**[0014]**For elliptic curve encryption and decryption, given a message point (x

_{m}, y

_{m}), a base point (x

_{B}, y

_{B}), and a given key, k, the cipher point (x

_{C},y

_{C}) is obtained using the equation (x

_{C},y

_{C})=(x

_{m,y}

_{m})+k(x

_{B},y

_{B}).

**[0015]**There are two basics steps in the computation of the above equations. The first step is to find the scalar multiplication of the base point with the key, k(x

_{B},y

_{B}). The resulting point is then added to the message point, (x

_{m}, y

_{m}) to obtain the cipher point. At the receiver, the message point is recovered from the cipher point, which is usually transmitted, along with the shared key and the base point (x

_{m,y}

_{m})=(x

_{C},y

_{C})-k(x

_{B},y

_{B}).

**[0016]**As noted above, the x-coordinate, x

_{m}, is represented as an N-bit string. However, not all of the N-bits are used to carry information about the data of the secret message. Assuming that the number of bits of the x-coordinate, x

_{m}, that do not carry data is L, then the extra bits L are used to ensure that message data, when embedded into the x-coordinate, will lead to an x

_{m}value that satisfies the elliptic curve equation (1). Typically, if the first guess of x

_{m}is not on a curve, then the second or third try will be.

**[0017]**Thus, the number of bits used to carry the bits of the message data is (N-L). If the secret data is a K-bit string, then the number of elliptic curve points needed to encrypt the K-bit data is

**( K N - L ) . ##EQU00003##**

**It is important to note that the y**-coordinate, y

_{m}, of the message point carries no data bits.

**[0018]**An attack method, referred to as power analysis, exists in which the secret information is decrypted on the basis of leaked information. An attack method in which change in voltage is measured in cryptographic processing using secret information, such as DES (Data Encryption Standard) or the like, such that the process of the cryptographic processing is obtained, and the secret information is inferred on the basis of the obtained process, is known.

**[0019]**As one of the measures against power analysis attack on elliptic curve cryptosystems, a method using randomized projective coordinates, is known. This is a measure against an attack method of observing whether a specific value appears or not in scalar multiplication calculations, and inferring a scalar value from the observed result. By multiplication with a random value, the appearance of such a specific value is prevented from being inferred.

**[0020]**In the above-described elliptic curve cryptosystem, attack by power analysis, such as DPA or the like, was not taken into consideration. Therefore, in order to relieve an attack by power analysis, extra calculation has to be carried out using secret information in order to weaken the dependence of the process of the cryptographic processing and the secret information on each other. Thus, time required for the cryptographic processing increases so that cryptographic processing efficiency is lowered.

**[0021]**With the development of information communication networks, cryptographic techniques have been indispensable elements for the concealment or authentication of electronic information. Efficiency in terms of computation time is a necessary consideration, along with the security of the cryptographic techniques. The elliptic curve discrete logarithm problem is so difficult that elliptic curve cryptosystems can make key lengths shorter than that in Rivest-Shamir-Adleman (RSA) cryptosystems, basing their security on the difficulty of factorization into prime factors. Thus, elliptic curve cryptosystems offer comparatively high-speed cryptographic processing with optimal security. However, the processing speed is not always high enough to satisfy smart cards, for example, which have restricted throughput or servers that have to carry out large volumes of cryptographic processing.

**[0022]**The pair of equations for m in Table 1 are referred to as "slope equations". Computation of a slope equation in finite fields requires one finite field division. Alternatively, the slope computation can be computed using one finite field inversion and one finite field multiplication. Finite field division and finite field inversion are costly in terms of computational time because they require extensive CPU cycles for the manipulation of two elements of a finite field with a large order. Presently, it is commonly accepted that a point-doubling and a point-addition operation each require one inversion, two multiplications, a square, and several additions. At present, there are techniques to compute finite field division and finite field inversion, and techniques to trade time-intensive inversions for multiplications through performance of the operations in projective coordinates.

**[0023]**In cases where field inversions are significantly more time intensive than multiplication, it is efficient to utilize projective coordinates. An elliptic curve projective point (X,Y,Z) in conventional projective (or homogeneous) coordinates satisfies the homogeneous Weierstrass equation:

**{tilde over (F)}(X,Y,Z)=Y**

^{2}Z-X

^{3}-aXZ

^{2}-bZ

^{3}=0, (2)

**and**, when Z≠0, it corresponds to the affine point

**( x , y ) = ( X Z , Y Z ) . ##EQU00004##**

**Other projective representations lead to more efficient implementations**of the group operation, such as the jacobian representations, where the triplets (X,Y,Z) correspond to the affine coordinates

**( x , y ) = ( X Z 2 , Y Z 3 ) ##EQU00005##**

**whenever Z**≠0. This is equivalent to using a jacobian elliptic curve equation that is of the form:

**{tilde over (F)}**

_{j}(X,Y,Z)=Y

^{2}-X

^{3}-aXZ

^{4}-bz

^{6}=0. (3)

**[0024]**Another commonly used projection is the Chudnovsky-jacobian coordinate projection. In general terms, the relationship between the affine coordinates and the projection coordinates can be written as

**( x , y ) = ( X Z i , Y Z j ) ##EQU00006##**

**where the values of i and j depend on the choice of the projective**coordinates. For example, for homogeneous coordinates, i=1 and j=1.

**[0025]**The use of projective coordinates circumvents the need for division in the computation of each point addition and point doubling during the calculation of scalar multiplication. Thus, finite field division can be avoided in the calculation of scalar multiplication,

**k**( X B Z B i , Y B Z B j ) , ##EQU00007##

**when using projective coordinates**.

**[0026]**The last addition for the computation of the cipher point,

**( X C Z C i , Y C Z C j ) , ##EQU00008##**

**i**.e., the addition of the two points

**( X m Z m i , Y m Z m j ) and ##EQU00009## k ( X B Z B i , Y B Z B j ) , ##EQU00009.2##**

**can also be carried out in the chosen projection coordinate**:

**( X C Z C i , Y C Z C j ) = ( X m Z m i , Y m 1 Z m j ) + ( X B Z B i , Y B Z B j ) . ##EQU00010##**

**It should be noted that Z**

_{m}=1.

**[0027]**However, one division (or one inversion and one multiplication) must still be carried out in order to calculate

**x C**= X C Z C i , ##EQU00011##

**since only the affine x**-coordinate of the cipher point, x

_{C}, is sent by the sender.

**[0028]**Thus, the encryption of (N-L) bits of the secret message using elliptic curve encryption requires at least one division when using projective coordinates. Similarly, the decryption of a single message encrypted using elliptic curve cryptography also requires at least one division when using projective coordinates.

**[0029]**Thus, an XZ-elliptic curve cryptography system and method solving the aforementioned problems is desired.

**SUMMARY OF THE INVENTION**

**[0030]**The XZ-elliptic curve cryptography system and method provides for improved secure communication over an insecure channel using elliptic curve cryptography. The method utilizes three stages of coordinate projections. In the first of the three stages, a projective coordinate is used to embed extra message data bits in the Z-coordinate as well as the X-coordinate. In the second stage, a projective coordinate is used to remove a division operation at each iteration (and also for randomizing the computation) in order to provide a countermeasure against differential power analysis. Once a cipher point is obtained from the first two stages, the third stage exploits the isomorphism between projected elliptic curves to embed extra message data bits by transforming the cipher point obtained from the first two stages to an isomorphic curve whose parameters are also protected by a secret key. The key of the third stage may be either symmetric or may be generated through a public-key cryptosystem.

**[0031]**The method of performing symmetric, enhanced XZ elliptic curve cryptography includes the following steps: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}; (b) the sending correspondent and the receiving correspondent further agreeing upon a random scalar k and a random shared secret key for communication E

_{s}, and agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}.

**[0032]**The sending correspondent then performs the following steps: (c) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}); (d) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk}, Y

_{Bk},Z

_{Bk})=k(X

_{B},Y

_{B}, Z

_{B}); (e) computing a cipher point (X

_{c}, Y

_{c}, Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m},Y

_{m},Z

_{m})+k(X

_{B},Y

_{B},Z.s- ub.B); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{CE}

_{s}and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively; (h) calculating a cipher transformation index E

_{c}as

**E c**= E s E m ; ##EQU00012##

**and**(i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}, and E

_{c}to the receiving correspondent.

**[0033]**The receiving correspondent then performs the following steps: (j) calculating the data transformation index E

_{m}as

**E m**= E s E c ; ##EQU00013##

**(k) calculating the cipher point coordinates X**

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{CE}

_{s}

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (l) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk},Y

_{Bk},Z

_{Bk})=(X

_{B},Y

_{B},Z

_{B}); (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k(X

_{B},Y

_{B},Z.s- ub.B); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m}, Z

_{m}).

**[0034]**Preferably, the shared secret key for communication E

_{s}and the data transformation index E

_{m}are selected to be powers of a common base μ, i.e., E

_{s}=μ

^{e}

^{s}and E

_{m}=μ

^{3}

^{m}. Thus, E

_{c}=μ

^{e}

^{c}where e

_{s}is shared, e

_{m}is used for embedding the message, and e

_{c}is sent. Preferably, μ is a power of two.

**[0035]**In an alternative embodiment for performing public key cryptography, the sending and the receiving entities use two keys, i.e., a private key and a public key. While the pair of public and private keys that is used to obtain the cipher point (X

_{c},Y

_{c},Z

_{c}) are generated in a conventional way, the pair of public and private keys that is used to obtain the cipher transformation index E

_{c}can be generated using any suitable public key system, i.e., it can be generated using RSA, an elliptic curve method or the like.

**[0036]**The alternative method of performing symmetric, enhanced XZ elliptic curve cryptography with a public key includes the following steps: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}, the sending correspondent further establishing a private key pair (k

_{SPr},e

_{SPr}); and (b) the sending correspondent and the receiving correspondent further agreeing upon a base point (Y

_{B},Y

_{B},Z

_{B})εEC

^{3}and sharing a public key pair (k

_{SPr}(X

_{B},Y

_{B},Z

_{B}),E

_{b}

^{e}.sup.Spr).

**[0037]**The sending correspondent then performs the following steps: (c) calculating a shared key as (k

_{SPr}(k

_{RPr}(X

_{B},Y

_{B},Z

_{B})), (E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr); (d) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}); (e) computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m},Y

_{m}Z

_{m})+k

_{Spr}(k

_{Rpr}(X.- sub.B,Y

_{B},Z

_{B})); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{C}(E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}respectively; (h) calculating a cipher transformation index E

_{c}as

**E c**= ( E b e RPr ) e SPr E m ; ##EQU00014##

**and**(i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent.

**[0038]**The receiving correspondent then performs the following steps: (j) calculating the shared key as (k

_{Rpr}(k

_{Spr}(X

_{B},Y

_{B},Z

_{B})), (E

_{b}

^{e}.sup.Spr)

^{e}

^{RP}r); (k) calculating the data transformation index E

_{m}as

**E m**= ( E b e RPr ) e SPr E c ; ##EQU00015##

**(l) calculating the cipher point coordinates X**

_{c}and Z

_{c}as X

_{c}={circumflex over (X)}

_{C}((E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr)

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k

_{Rpr}(k

_{SPr}(X-

_{B},Y

_{B},Z

_{B})); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

**[0039]**As in the previous embodiment, preferably, the shared number E

_{b}and the data transformation index E

_{m}are selected to be powers of a common base μ, i.e., E

_{b}=μ

^{e}

^{b}and E

_{m}=μ

^{e}

^{m}. Thus, E

_{c}=μ

^{e}

^{c}where e

_{m}is used for embedding the message and e

_{c}is sent. Preferably, μ is a power of two.

**[0040]**In conventional elliptic curve cryptography, encryption and decryption, the message data bits are embedded in only the affine x-coordinate x

_{m}of the elliptic curve points. Further, given an elliptic curve defined over F(p) that needs N bits for the representation of its elements, each x-coordinate x

_{m}carries only (N-L) bits of the message data bits. Thus, at least one inversion or division over F(p) (i.e., one modulo p inversion or division) is needed per (N-L)-bit encryption.

**[0041]**In the present method, the encryption of more than (2N-L) bits of the message data is achieved per one inversion or division over F(p), i.e., per one modulo p inversion or division. This is achieved by first defining an elliptic curve group over addition in projective coordinates, which allows the embedding of one part of the message data bit-string in both the X-coordinate and the Z-coordinate of the elliptic curve points, where X and Z are elements of F(p) represented in N-bit strings; and secondly, transforming the cipher point to an isomorphic curve which is determined by the second part of the message data bit-string. In the present method, the relevant bits of both the X- and Z-coordinates of the transformed cipher point, as well as the bits of the ciphered transformation index E

_{C}, are sent to the receiver.

**[0042]**At the receiving entity, the message bits are recovered from X- and Z-coordinates of the cipher point, as well as the bits of the ciphered transformation index E

_{C}, which is achieved using one inversion or division over F(p) (i.e., one modulo p inversion or division).

**[0043]**Further, in the present method, an additional projective coordinate is used at the sending and receiving entities to eliminate the inversion or division during each addition and doubling operation of the scalar multiplication. Thus, up to (3N-L) bits of the message data can be encrypted (and subsequently decrypted) using one inversion or division.

**[0044]**The use of embedding in the X- and Z-coordinates of an elliptic curve point, combined with the embedding in the transformation index, increases the number of points that satisfy an elliptic curve equation, which can then be used in the corresponding cryptosystem, such that the number of points is proportional to p

^{3}rather than p. Thus, for the same number of embedded bits, a smaller p can be used when embedding in the X- and Z-coordinates, as well as the transformation index, than when embedding only in the x-coordinate. This results in faster implementations and reduced power consumption.

**[0045]**These and other features of the present invention will become readily apparent upon further review of the following specification and drawings.

**BRIEF DESCRIPTION OF THE DRAWINGS**

**[0046]**The sole drawing Figure is a block diagram illustrating system components for an XZ-elliptic curve cryptography system and method according to the present invention.

**DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS**

**[0047]**The XZ-elliptic curve cryptography system and method provides for improved secure communication over an insecure channel using elliptic curve cryptography. The method utilizes three stages of coordinate projections. In the first of the three stages, a projective coordinate is used to embed extra message data bits in the Z-coordinate as well as the X-coordinate. In the second stage, a projective coordinate is used to remove a division operation at each iteration (and also for randomizing the computation) in order to provide a countermeasure against differential power analysis. Once a cipher point is obtained from the first two stages, the third stage exploits the isomorphism between projected elliptic curves to embed extra message data bits by transforming the cipher point obtained from the first two stages to an isomorphic curve whose parameters are also protected by a secret key. The key of the third stage may be either symmetric or may be generated through a public-key cryptosystem.

**[0048]**The method begins by defining a set of elliptic curve points represented in projective coordinates as a group over addition. Given a field F(p), and defining a&bεF(p), where the symbol E denotes set membership, EC

^{2}is defined as the set of points (x,y) that satisfy the elliptic curve equation in affine coordinates (i.e., F(x,y)=y

^{2}-x

^{3}-ax-b=0), where x& yεF (p), together with a point at infinity.

**[0049]**It is known that using the addition rules defined above for the set of points EC

^{2}, the set EC

^{2}forms an abelian group over addition, denoted as (EC

^{2}, +). The present method utilizes a projection (X,Y,Z), which is related to the affine coordinates as:

**y**= Y Z 3 2 ( 4 ) x = X Z . ( 5 ) ##EQU00016##

**[0050]**Substitution of equations (5) and (6) into the elliptic curve equation yields:

**F**~ ( X , Y , Z ) = Z 3 F ( X Z , Y Z 3 2 ) = Y 2 - X 3 - aXZ 2 - bZ 3 = 0. ( 6 ) ##EQU00017##

**It should be noted that if F**(x,y) is non-singular (i.e., 4a

^{2}+27b

^{3}≠0), then {tilde over (F)}(X,Y,Z) is also non-singular. In the following, it is assumed that the elliptic curve equations are non-singular.

**[0051]**The set of points EC

^{3}is defined as the triplets (X,Y,Z), where X,Y & ZεF(p), that satisfy equation (6), along with a point at infinity (X

_{l},Y

_{l},Z

_{l}), and excluding the point at the origin (0,0,0). It should be noted that EC

^{3}is in projective coordinates, while EC

^{2}is in affine coordinates. The addition rules for the group (EC

^{2}, +) can be adopted to define an additive binary operation, denoted as "+", over EC

^{3}. For all (X

_{1},Y

_{1}Z

_{1})εEC

^{3}and (X

_{2},Y

_{2},Z

_{2})εC

^{3}, the sum (X

_{3},Y

_{3},Z

_{3})=(X

_{1}Y

_{1}Z

_{1})+(X

_{2},Y

_{2}, Z

_{2}) is also (X

_{3},Y

_{3},Z

_{3})εEC

^{3}.

**[0052]**It can be seen that (EC

^{3}, +) also forms a group over addition that satisfies the following axioms: (i) There exists (X

_{1},Y

_{1},Z

_{1})εEC

^{3}such that (X,Y,Z)+(X

_{1},Y

_{1},Z

_{1})=(X,Y,Z) for all (X,Y,Z)εEC(K

^{3}); (ii) for every (X,Y,Z)εEC

^{3}, there exists -(X,Y,Z)εEC

^{3}such that (X,Y,Z)-(X,Y,Z)=(X

_{1},Y

_{1},Z

_{1}); (iii) the additive binary operation is commutative; and (iv) the additive binary operation is associative.

**[0053]**With regard to the addition rules for the group (EC

^{3}, +), the addition of two points on an elliptic curve in projective coordinate EC

^{3}is calculated as follows. When a straight line is drawn through two points of EC

^{3}, the straight line intersects the elliptic curve in projective coordinates at a third point. The point symmetric to this third intersecting point, with respect to the X-axis, is defined as a point resulting from the addition.

**[0054]**A straight-line equation in projective coordinates is given by:

**X**- X 1 X 2 - X 1 = Y - Y 1 Y 2 - Y 1 = Z - Z 1 Z 2 - Z 1 . ( 7 ) ##EQU00018##

**The basic addition rule can be formulated as follows**: Draw the line that joins the two points to be added in the set EC

^{3}. Denoting the third point of intersection as (X'

_{3},Y'

_{3},Z'

_{3}), the sum point is defined as (X

_{3},Y

_{3},Z

_{3})=(X'

_{3}-Y'

_{3},Z'

_{3}). It follows from the above definition that the addition over EC

^{3}is commutative, that is:

**(X**

_{1},Y

_{1},Z

_{1})+(X

_{2},Y

_{2},Z

_{2})=(X

_{2},Y

_{2},Z.s- ub.2)+(X

_{1}Y

_{1},Z

_{1})

**for all**(X

_{1}, Y

_{1},Z

_{1})εE(K

^{3}) and (X

_{2},Y

_{2},Z

_{2})εE(K

^{3}). This satisfies axiom (iii) above.

**[0055]**There are four main cases that need to be considered for the computation of addition for (EC

^{3}, +):

**[0056]**(A) X

_{1}≠X

_{2};

**[0057]**(B) X

_{1}=X

_{2}and Z

_{1}≠Z

_{2};

**[0058]**(C) (X

_{1}Y

_{1},Z

_{1})=(X

_{2}Y

_{2},Z

_{2}) (i.e., point doubling); and

**[0059]**(D) X

_{1}=X

_{2}and Z

_{1}=Z

_{2}

**[0060]**For case (A) where X

_{1}≠X

_{2}, we have:

**Y**3 ' = Y 1 + m y ( X 3 ' - X 1 ) and ( 8 ) Z 3 ' = Z 1 + m z ( X 3 ' - X 1 ) , where ( 9 ) m y = Y 2 - Y 1 X 2 - X 1 and ( 10 ) m z = Z 2 - Z 1 X 2 - X 1 .. ( 11 ) ##EQU00019##

**[0061]**Substituting equation (8) for Y'

_{3}and equation (9) for Z'

_{3}into equation (6) yields:

**(Y**

_{1}+m

_{y}(X-X

_{1}))

^{2}-X

^{3}-aX(Z

_{1}+m

_{z}(X-X

_{1})- )

^{2}-b(Z

_{1}+m

_{z}(X-X

_{1}))

^{3}=0 (12)

**Expanding the terms between parentheses and grouping the terms with the**same powers of X gives:

**X**

^{3}+am

_{z}

^{2}X

^{3}+bm

_{z}

^{3}X

^{3}-m

_{y}

^{2}X

^{2}- +2am

_{z}Z

_{1}X

^{2}-2am

_{z}

^{2}X

^{2}X

_{1}+bm

_{z}

^{2}Z.sub- .1X

^{2}+2bm

_{z}

^{2}Z

_{1}X

^{2}-2bm

^{3}

_{z}X

^{2}X

_{1}-bm.s- ub.z

^{3}X

^{2}X

_{1}-2m

_{y}Y

_{1}X+2m

_{y}

^{2}XX

_{1}+aXZ

_{1}-

^{2}-2am

_{z}Z

_{1}XX

_{1}+am

_{z}

^{2}XX

_{1}

^{2}+2bm

_{z}Z.su- b.1

^{2}X-2XX

_{1}bm

_{z}

^{2}Z

_{1}+bm

_{z}XZ

_{1}

^{2}-4bm

_{z}-

^{2}Z

_{1}XX

_{1}+bm

_{z}

^{3}XX

_{1}

^{2}+2bm

^{3}

_{z}XX

_{1}-

^{2}-Y

_{1}

^{2}+2m

_{y}Y

_{1}X

_{1}-m

_{y}

^{2}X

_{1}

^{2}+bZ.- sub.1

^{3}-2bm

_{z}Z

_{1}

^{2}X

_{1}++bX

_{1}

^{2}m

_{z}

^{2}Z.su- b.1-bm

_{z}X

_{1}Z

_{1}

^{2}+2bm

_{z}

^{3}Z

_{1}X

_{1}-bm

_{2}.su- p.3X

_{1}

^{3}=0. (13)

**[0062]**In order to solve the above, it is recognized that any cubic equation has three roots, such that

**(X-X**

_{1})(X-X

_{2})(X-X'

_{3})=0, (14)

**and scaling the coefficient of the term X**

^{3}to 1 in equation (13), and equating the coefficient of the term X

^{2}in equations (13) and (14), yields:

**X**3 ' = 1 c ( m y 2 - 2 am z Z 1 + 2 am z 2 X 1 - 3 bm z 2 Z 1 + 3 bm z 3 X 1 ) - X 1 - X 2 or ( 15 ) X 3 ' = 1 c ( m y 2 - ( 2 a + 3 bm z ) m z Z 1 + ( 2 a + 3 bm z ) m z 2 X 1 ) - X 1 - X 2 . ( 16 ) ##EQU00020##

**[0063]**After grouping terms to reduce the number of computations, one obtains:

**X**3 ' = 1 c ( m y 2 - m z ( 2 a + 3 bm z ) ( Z 1 - m z X 1 ) ) - X 1 - X 2 , ( 17 ) ##EQU00021##

**where**

**c**=1+am

_{z}

^{2}+bm

_{z}

^{3}. (18).

**[0064]**Substituting the solution of X'

_{3}, which is given in equation (17), into equation (8) yields the solution for Y'

_{3}. Similarly, substituting the solution of X'

_{3}, which is given in equation (17), into equation (9) produces the solution for Z'

_{3}.

**[0065]**For case (B), where X

_{1}=X

_{2}and Z

_{1}≠Z

_{2}, we let X

_{o}=X

_{1}=X

_{2}. In this case, X

_{3}=X

_{1}=X

_{2}=X

_{o}, since the straight line is in the YZ-plane X

_{o}. Thus, one can write:

**Y**'

_{3}=Y

_{1}+n

_{y}(Z'

_{3}-Z

_{1}), (19)

**where**

**n y**= Y 2 - Y 1 Z 2 - Z 1 . ##EQU00022##

**Substituting equation**(19) into equation (6) (and noting that X=X

_{0}) yields:

**(Y**

_{1}+n

_{y}(Z-Z

_{1}))

^{2}-X

_{o}

^{3}-aX

_{o}Z

^{2}-bZ

^{3}=0. (20)

**[0066]**Expanding the terms between parentheses and grouping the terms with the same powers of Z, one obtains:

**Z**3 - 1 b ( n y 2 Z 2 - aX o Z 2 ) + 1 b ( 2 n y Y 1 Z - 2 n y 2 ZZ 1 + Y 1 2 - 2 n y Y 1 Z 1 + n y 2 Z 1 2 - X o 3 ) = 0. ( 21 ) ##EQU00023##

**In order to solve the above**, it is recognized that any cubic equation has three roots, such that:

**(Z-Z**

_{1})(Z-Z

_{2})(Z-Z'

_{3})=0 (22).

**[0067]**Equating the coefficient of the term Z

^{2}in equations (21) and (22), one obtains:

**Z**3 ' = 1 b ( n y 2 - aX o ) - Z 1 - Z 2 , ( 23 ) ##EQU00024##

**and substituting the solution of Z**'

_{3}into equation (19) produces the solution for Y'

_{3}.

**[0068]**For case (C), which involves point doubling, (X

_{1},Y

_{1},Z

_{1})=(X

_{2},Y

_{2},Z

_{2}). Letting (X

_{o},Y

_{o},Z

_{o})=(X

_{1},Y

_{1},Z

_{1})=(X

_{2},Y

_{2},Z.su- b.2), then (X

_{3},Y

_{3},Z

_{3})=2(X

_{o},Y

_{o},Z

_{o}). Doubling a point on an elliptic curve in projective coordinates can be defined in several ways. In the first case (C.1), when a tangent line in an XV-plane is drawn at a point on an elliptic curve, the tangent line intersects the elliptic curve in the projective coordinates EC

^{3}at another point. The point symmetric to this intersecting point with respect to the X-axis is defined as a point resulting from the doubling. It should be noted that in this case, Z'

_{3}=Z

_{o}.

**[0069]**In the second case (C.2), when a tangent line in a YZ-plane is drawn at a point on an elliptic curve, the tangent line intersects the elliptic curve in the projective coordinates EC

^{3}at another point. The point symmetric to this intersecting point with respect to the X-axis is defined as a point resulting from the doubling. It should be noted that in this case, X'

_{3}=X

_{o}.

**[0070]**In a third case (C.3), some form of a combination of rules (C.1) and (C.2) may be used. The simplest combination is to perform doubling using rule (C.1) followed by another doubling using rule (C.2). Another combination involves using the gradients in (C.1) and (C.2) simultaneously.

**[0071]**For case (C.1), Z

_{3}=Z

_{1}=Z

_{2}=Z

_{o}. The gradient of the tangent of the point (X

_{o},Y

_{o},Z

_{o}) of the elliptic curve in projective coordinates in an XY-plane is given by:

**Y X**= 3 X o 2 + aZ o 2 2 Y o = m y . ( 24 ) ##EQU00025##

**[0072]**Substituting equation (24) for m

_{y}in the equation for X'

_{3}, and noting that m

_{z}=0 in this case, one obtains the solution for X'

_{3}:

**X**'

_{3}=m

^{2}

_{y}-X

_{1}-X

_{2}. (25)

**One may similarly obtain the solution for Y**'

_{3}from case (A) above.

**[0073]**For case (C.2), X

_{3}=X

_{1}=X

_{2}=X

_{o}. The gradient of the tangent of the point (X

_{o},Y

_{o},Z

_{o}) of the elliptic curve in projective coordinates in a YZ-plane is given by:

**Y Z**= 2 aX o Z o + 3 bZ o 2 2 Y o = n y . ( 26 ) ##EQU00026##

**Substituting equation**(26) for n

_{y}in equation (23), one obtains a solution for Z'

_{3}:

**Z**3 ' = 1 b ( n y 2 - aX o ) - Z 1 - Z 2 . ( 27 ) ##EQU00027##

**Similarly**, substituting the solution of Z'

_{3}into equation (19), one obtains the solution for Y'

_{3}.

**[0074]**For case (D), X

_{1}=X

_{2}and Z

_{1}=Z

_{2}. Letting X

_{o}=X

_{1}=X

_{2}and Z

_{o}=Z

_{1}=Z

_{2}allows for substitution of these values directly into equation (6), thus producing a quadratic equation for the Y-coordinate:

**Y**

^{2}=X

_{o}

^{3}+aX

_{o}Z

_{o}

^{2}Z

_{o}

^{2}+bZ

_{o}

^{3}, (28)

**where Y**

_{o}represents one of the solutions. The other solution must be -Y

_{o}.

**[0075]**Therefore, a line perpendicular to the XZ-plane intersects EC

^{3}at only two points: (X,Y,Z) and (X,-Y,Z)εEC

^{3}. This clearly shows the symmetry of EC

^{3}about the X-axis and the Z-axis. Furthermore, every (X,Y,Z)εEC

^{3}has a unique mirror image point (X,-Y,Z)εEC

^{3}. Thus, since a line joining such pairs (X,Y,Z) and (X,-Y,Z)εEC

^{3}does not intersect with EC

^{3}at a third finite point, such lines are assumed to intersect with EC

^{3}at the point of infinity (X

_{1},Y

_{1},Z

_{1}). This point at infinity is used to define both the inverse of a point in EC

^{3}and the identity point. According to the addition rule defined above, one can write:

**(X,Y,Z)+(X,-Y,Z)=(X.sub.I,Y.sub.I,Z.sub.I), (29)**

**since the third point of intersection of such lines is the point at**infinity. This equation therefore defines a unique inverse for any point (X,Y,Z)εEC

^{3},

**-(X,Y,Z)=(X,-Y,Z). (30)**

**[0076]**Thus, equation (29) can be written as:

**(X,Y,Z)-(X,Y,Z)=(X.sub.I,Y.sub.I,Z.sub.I). (31)**

**[0077]**Additionally, a line joining the point at infinity and any point (X,Y,Z)εEC will intersect with EC

^{3}at (X,-Y,Z). Therefore, from the addition rule defined above, one may also write:

**(X,Y,Z)+(X.sub.I,Y.sub.I,Z.sub.I)=(X,Y,Z). (32)**

**Equation**(31) satisfies axiom (ii) while equation (32) satisfies axiom (i) of the group (EC

^{3},+).

**[0078]**With regard to the second projective coordinate, each of the equations for point addition and point doubling derived for the cases (A), (B) and (C) above require one modular inversion or division. In cases where field inversions or divisions are significantly more expensive than multiplication (in terms of time and computational power), a second projective coordinate is used to remove the requirement for field inversion or division from these equations. As shown below, the number of operations needed for EC

^{3}point doubling and point addition when performed in the second projective coordinate are comparable to those needed in EC

^{2}. It should be noted that several projective coordinates can be used. In the present method, the homogenous projection is used as an example:

**X**= X V ( 33 ) Y = Y V ( 34 ) Z = Z V . ( 35 ) ##EQU00028##

**[0079]**Using this projection in the elliptic curve equation given by equation (6), one obtains a homogeneous elliptic curve equation:

**F**~ ( X , Y , Z , V ) = V F ~ ( X V , Y V , Z V ) = Y 2 V - X 3 - aXZ 2 - bZ 3 = 0 , ( 36 ) ##EQU00029##

**where an elliptic curve projective point**(X,Y,Z,V) using homogenous projective coordinates satisfies the homogenous elliptic curve equation (36).

**[0080]**When V≠0, the homogenous projected point (X,Y,Z,V)

**corresponds to the projected point**

**( X , Y , Z ) = ( X V , Y V , Z V ) . ##EQU00030##**

**Using homogenous projective coordinates**, the equation for point addition can be written as:

**( X 3 V 3 , Y 3 V 3 , Z 3 V 3 ) = ( X 1 V 1 , Y 1 V 1 , Z 1 V 1 ) + ( X 2 V 2 , Y 2 V 2 , Z 2 V 2 ) . ( 37 ) ##EQU00031##**

**[0081]**In the following, it is shown how the homogenous projective coordinates can be used to remove the need for modular inversion or division from the equations given above for cases (A), (B) and (C). Starting with case (A), substitution for X, Y and Z in terms of the projective coordinates in equations (33), (34) and (35) into the equation given above for X

_{3}', and noting that c=1+am

_{z}

^{2}+bm

_{z}

^{3}, yields:

**X**3 ' V 3 = ( λ yv 2 λ xv - 2 a λ zv λ xv 2 Z 1 + 2 a λ zv 2 λ xv X 1 - 3 b λ zv 2 λ xv Z 1 + 3 b λ zv 3 X 1 ) λ xzv - X 1 ' V 1 - X 2 ' V 2 , ( 38 ) ##EQU00032##

**where**

**λ**

_{xv}=(X

_{2}V

_{1}-X

_{1}V

_{2}) (39)

**λ**

_{yv}=(Y

_{2}V

_{1}-Y

_{1}V

_{2}) (40)

**λ**

_{zv}=(Z

_{2}V

_{1}-Z

_{1}V

_{2}) (41)

**λ**

_{xzv}=(λ

_{xv}

^{3}+aλ

_{xv}λ

_{zv}

^{2}++bλ

_{zv}

^{3}). (42)

**Letting**

**V**

_{3}=V

_{1}V

_{2}λ

_{xv}λ

_{xzv}(43)

**and substituting equation**(43) for V

_{3}in equation (38), one obtains

**X**'

_{3}=λ

_{xv}A

_{x3}, (44)

**where**

**A**

_{x3}={λ

_{yv}

^{2}λ

_{xv}V

_{2}-λ

_{zv}(2a.la- mda.

_{xv}+3bλ

_{zv})(λ

_{xv}Z

_{1}V

_{2}-λ

_{zv}X-

_{1}V

_{2})-λ

_{xzv}(V

_{2}X

_{1}+V

_{1}X

_{2})}. (45)

**[0082]**Substituting for X and Yin terms of the projective coordinates in equations (33) and (34) into the equation given above for Y

_{3}', and following simplification, gives:

**Y**3 ' V 3 = Y 1 V 1 + ( Y 2 V 1 - Y 1 V 2 ) ( X 2 V 1 - X 1 V 2 ) V 3 ( X 3 ' - X 1 V 3 V 1 ) . ( 46 ) ##EQU00033##

**[0083]**Substituting equations (43) and (44) for V

_{3}and X'

_{3}into equation (46) produces

**Y**'

_{3}=V

_{2}λ

_{xv}λ

_{xzv}Y

_{1}+λ

_{yv}(A.su- b.x3-V

_{2}λ

_{xzv}X

_{1}) (47)

**and substituting X and Z in terms of the projective coordinates in**equations (33) and (35) into the equation given above for Z

_{3}', and following simplification, gives:

**Z**3 ' V 3 = Z 1 V 1 + ( Z 2 V 1 - Z 1 V 2 ) ( X 2 V 1 - X 1 V 2 ) V 3 ( X 3 ' - X 1 V 3 V 1 ) . ( 48 ) ##EQU00034##

**Substituting equations**(43) and (44) for V

_{3}and X'

_{3}into equation (48) produces

**Z**'

_{3}=V

_{2}λ

_{xv}λ

_{xzv}Z

_{1}+λ

_{zv}(A.su- b.x3-V

_{2}λ

_{xzv}X

_{1}). (49)

**[0084]**The number of field operations needed in equations (44), (47) and (49) are 24 multiplications, three squaring operations, and ten addition operations. When using mixed coordinates, the number of multiplications can be reduced to twenty multiplications.

**[0085]**For case (B), substituting X, Y and Z in terms of the heterogeneous projective coordinate into the equation given above for Z'

_{3}, and noting that X

_{3}=X

_{1}=X

_{2}=X

_{o}, one obtains:

**Z**3 ' V 3 = 1 b ( Y 2 V 1 - Y 1 V 2 ) 2 V 1 V 2 ( Z 2 V 1 - Z 1 V 2 ) 2 - a b X 1 V 1 - Z 1 V 1 - Z 2 V 2 , ( 50 ) ##EQU00035##

**and letting**

**V**

_{3}=V

_{1}

^{2}V

_{2}

^{2}(Z

_{2}V

_{1}-Z

_{1}V

_{2})

^{3}, (51)

**allows for the substitution of equation**(51) for V

_{3}into equation (50), yielding:

**Z**3 ' = 1 b V 1 V 2 ( Z 2 V 1 - Z 1 V 2 ) A 3 x , ( 52 ) where A 3 x = { ( Y 2 V 1 - Y 1 V 2 ) 2 - ( Z 2 V 1 2 - Z 1 V 2 2 ) 2 ( a b X 1 V 2 + Z 1 V 2 + Z 2 V 2 ) } . ( 53 ) ##EQU00036##

**[0086]**Substituting Y and Z in terms of the projective coordinates in equations (40) and (41) into the equation for Y

_{3}' produces:

**Y**3 ' V 3 = Y 1 V 1 + ( Y 2 V 1 - Y 1 V 2 ) V 3 × ( Z 3 ' V 1 V 2 ( Z 2 V 1 - Z 1 V 2 ) - Z 1 V 3 V 1 V 2 ( Z 2 V 1 - Z 1 V 2 ) V 1 ) , ( 54 ) ##EQU00037##

**and substituting equations**(51) and (52) for V

_{3}and Z'

_{3}into equation (54) gives

**Y**3 ' = V 1 V 2 2 ( Z 2 V 1 - Z 1 V 2 ) 3 Y 1 + ( Y 2 V 1 - Y 1 V 2 ) ( 1 b A 3 x - Z 1 V 2 ( Z 2 V 1 - Z 1 V 2 ) 2 ) . ( 55 ) ##EQU00038##

**[0087]**The number of field operations needed in equations (52) and (55) are sixteen multiplication operations, two squaring operations, and seven addition operations.

**[0088]**For case (C.1), substituting X, Y and Z in terms of the projective coordinates in equations (39), (40) and (41) into the equation for X'

_{3}produces

**X**3 ' V 3 = ( 3 X o 2 + aZ o 2 ) 2 4 V o 2 Y o 2 - 2 X o V o , ( 56 ) ##EQU00039##

**and letting**

**V**

_{3}=8V

_{o}

^{3}Y

_{o}

^{3}(57)

**allows for the substitution of equation**(57) into equation (56), yielding:

**X**'

_{3}=2V

_{o}Y

_{o}D

_{3}x, (58)

**where**

**D**

_{3}x={(3X

_{o}

^{2}+aZ

_{o}

^{2})

^{2}-8V

_{o}Y

_{o}

^{2}X.s- ub.o}. (59)

**Substituting X**, Y and Z in terms of the projective coordinates in equations in equations (39), (40) and (41) into the equation for Y

_{3}', and using the gradient, produces

**Y**3 ' V 3 = Y o V o + 3 X o 2 + aZ o 2 V 3 ( 2 V o Y o D 3 x 2 V o Y o - X o V 3 2 V o Y o V o ) , ( 60 ) ##EQU00040##

**and substituting equations**(57), (58) and (59) for V

_{3}, X'

_{3}and D

_{3}x gives:

**Y**'

_{3}=8v

_{o}

^{2}Y

_{o}

^{4}+3X

_{o}

^{2}+az

_{o}

^{2}((3X.s- ub.o

^{2}+az

_{o}

^{2})

^{2}-12V

_{o}Y

_{o}

^{2}X

_{o}). (61)

**The number of field operations needed in equations**(58) and (61) are six multiplication operations, four squaring operations, and five addition operations.

**[0089]**For case (C.1), substituting X, Yand Z in terms of the projective coordinates in equations (39), (40) and (41) into the equation for Z'

_{3}produces

**Z**3 ' V 3 = 1 b ( 2 aX o Z o + 3 bZ o 2 ) 2 4 Y o V o 2 - a b X o V o - 2 Z o V o ( 62 ) ##EQU00041##

**and letting**

**V**

_{3}=8V

_{o}

^{3}Y

_{o}

^{3}(63)

**allows for the substitution of equation**(63) into equation (62), yielding:

**Z**'

_{3}=2V

_{o}Y

_{o}D

_{3}z, (64)

**where**

**D**3 z = { 1 b ( 2 aX o Z o + 3 bZ o 2 ) 2 - 4 a b V o Y o 2 X o - 16 V o Y o 2 Z o } , ( 65 ) ##EQU00042##

**and substituting X**, Y and Z in terms of the projective coordinate in equations (39), (40) and (41) into the equation for Y'

_{3}, and using the gradient, gives:

**Y**3 ' V 3 = Y o V o + 2 aX o Z o + 3 bZ o 2 2 V o Y o ( Z 3 ' V 3 - Z o V o ) . ( 66 ) ##EQU00043##

**Substituting equations**(63) and (64) for V

_{3}and Z'

_{3}into equation (66) produces

**Y**'

_{3}=8V

_{o}

^{2}Y

_{o}

^{3}Y

_{o}+(2aX

_{o}Z

_{o}+3bZ

_{o}.- sup.2)(D

_{3}z-4V

_{o}Y

_{o}

^{2}Z

_{o}). (67)

**The number of field operations needed in equations**(64) and (67) are ten multiplication operations, three squaring operations, and five addition operations.

**[0090]**A third projection is applied to equation (6) in order to produce the present enhanced XZ elliptic curve system. Letting a secret transformation index E

_{s}be used to project equation (6) yields:

**{tilde over (F)}(X,Y,Z,E**

_{s})=E

_{s}

^{3}F(X,Y,Z)=E

_{s}

^{3}(Y

^{2}-X

^{3}-a- XZ

^{2}-bZ

^{3})=0 (68)

**[0091]**By introducing a data transformation index E

_{m}, and the cipher transformation index E

_{c}, such that E

_{s}=E

_{m}E

_{c}, produces:

**{tilde over (F)}(X,Y,Z,E**

_{s})=Y

^{2}E

_{s}

^{3}-X

^{3}E

_{s}

^{3}-aXZ

^{2}E.- sub.sE

_{m}

^{2}E

_{c}

^{2}-bZ

^{3}E

_{m}

^{2}E

_{c}

^{3}=0. (69)

**[0092]**The following substitutions may then be applied:

**=YE**

_{s}

^{3}/2, {circumflex over (X)}=XE

_{s}, {circumflex over (Z)}=ZE

_{m}, a=aE

_{c}

^{2}, {circumflex over (b)}=bE

_{c}

^{3}, (70)

**to produce**:

**{tilde over (F)}(X,Y,Z,E**

_{s})=

_{2}-{circumflex over (X)}

_{3}-a{circumflex over (X)}{circumflex over (Z)}

^{2}-{circumflex over (b)}{circumflex over (Z)}

^{3}={tilde over (F)}({circumflex over (X)}, ,{circumflex over (Z)})=0 (71)

**[0093]**Thus, any point on the curve {tilde over (F)}(X,Y,Z) can be transformed using the values E

_{s}, E

_{m}and E

_{c}to the isomorphic curve {tilde over (F)}({circumflex over (X)}, ,{circumflex over (Z)}). Due to the relationship between E

_{s}, E

_{m}and E

_{c}, the knowledge of two of them is necessary to know the third. Otherwise, the original curve cannot be retrieved.

**[0094]**The multiplicative relationship between E

_{s}, E

_{m}and E

_{c}indicates that a field division is required when computing E

_{m}or E

_{c}. The need for this division operation can be relieved if E

_{s}, E

_{m}and E

_{c}are chosen to be powers of a common base μεF(p), i.e., when E

_{s}=μ

^{e}

^{s}, E

_{m}=μ

^{e}

^{m}and E

_{c}=μ

^{e}

^{c}. In this case, e

_{s}=e

_{m}+e

_{c}and equation (69) becomes:

**{tilde over (F)}(X,Y,Z,μ**

^{e}

^{s})=Y

^{2}μ

^{3}e

^{s}-X

^{3}μ

^{3}e.- sup.s-aXZ

^{2}μ

^{e}

^{s}

^{2}(e

^{m}

^{+}e

^{c})-bZ

^{3}μ.s- up.3(e

^{m}

^{e}

^{c}.sup.)=0. (72)

**Then**, the following substitutions can be applied:

**=Yμ**

^{3}/2e

^{s}, {circumflex over (X)}=Xμ

^{e}

^{x},{circumflex over (Z)}=Zμ

^{e}

^{m}, a=aμ

^{2}e

^{c}, {circumflex over (b)}=bμ

^{3}e

^{c}, (73)

**in order to produce**:

**{tilde over (F)}(X,Y,Z,μ**

^{e}

^{s})=

^{2}-{circumflex over (X)}

^{3}a{circumflex over (X)}{circumflex over (Z)}

^{2}={circumflex over (b)}{circumflex over (Z)}

^{3}={tilde over (F)}({circumflex over (X)}, ,{circumflex over (Z)})=0 (74)

**[0095]**Again, it is necessary to know two of the exponents e

_{s}, e

_{m}and e

_{c}to know the third.

**[0096]**It should be noted that choosing μ as a power of two makes this transformation very efficient, since both multiplication and division operations can be implemented through a shift-and-reduce operation. Further, a special choice of the value of μ would allow the transformation of a point from or to the twist of the curve. In particular, if the value of μ is a quadratic non-residue in GF(p), then an odd value of e

_{s}transforms the point to the twist of the curve, since Y will be multiplied by μ

^{3}/2e

^{s}.

**[0097]**The present method of performing symmetric, enhanced XZ elliptic curve cryptography includes the following steps: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}; and (b) the sending correspondent and the receiving correspondent further agreeing upon a random scalar k and a random shared secret key for communication E

_{s}, and agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}.

**[0098]**The sending correspondent then performs the following steps: (c) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}); (d) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk},Y

_{Bk},Z

_{Bk})=k(X

_{B},Y

_{B},Z

_{B}); (e) computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m},Y

_{m},Z

_{m})+k(X

_{B},Y

_{B},Z.s- ub.B); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{CE}

_{s}and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively; (h) calculating a cipher transformation index E

_{c}as

**E c**= E s E m ; ##EQU00044##

**and**(i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent.

**[0099]**The receiving correspondent then performs the following steps: (j) calculating the data transformation index E

_{m}as

**E m**= E s E c ; ##EQU00045##

**(k) calculating the cipher point coordinates X**

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{CE}

_{s}

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (l) computing a scalar multiplication between the base point (X

_{B},Y

_{B},Z

_{B}) and the scalar k as (X

_{Bk},Y

_{Bk},Z

_{Bk})=k(X

_{B},Y

_{B},Z

_{B}); (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k(X

_{B},Y

_{B},Z.s- ub.B); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

**[0100]**Preferably, the shared secret key for communication E

_{s}and the data transformation index E

_{m}are selected so be powers of a common base μ, i.e., E

_{s}=μ

^{e}

^{s}and E

_{m}=μ

^{e}

^{m}. Thus, E

_{c}=μ

^{e}

^{c}where e

_{s}is shared, e

_{m}is used for embedding the message, and e

_{c}is sent. Preferably, μ is a power of two.

**[0101]**In an alternative embodiment for performing public key cryptography, the sending and the receiving entities use two keys, i.e., a private key and a public key. While the pair of public and private keys that is used to obtain the cipher point (X

_{c}, Y

_{c},Z

_{c}) are generated in a conventional way, the pair of public and private keys that is used to obtain the cipher transformation index E, can be generated using any suitable public key system, i.e., it can be generated using RSA, an elliptic curve method or the like.

**[0102]**The alternative method of performing symmetric, enhanced XZ elliptic curve cryptography with a public key includes the following steps: (a) a sending correspondent and a receiving correspondent selecting and agreeing upon an elliptic curve set EC

^{3}, the sending correspondent further establishing a private key pair (k

_{SPr},e

_{SPr}); and (b) the sending correspondent and the receiving correspondent further agreeing upon a base point (X

_{B},Y

_{B},Z

_{B})εEC

^{3}and sharing a public key pair (k

_{SPr}(X

_{B},Y

_{B},Z

_{B}),E

_{b}

^{e}.sup.SPr).

**[0103]**The sending correspondent then performs the following steps: (c) calculating a shared key as (k

_{SPr}(k

_{RPr}(X

_{B},Y

_{B},Z

_{B})),E

_{b}

^{e}

^{RP}r).sup- .e.sup.SPr); (d) embedding a first secret message bit string into an elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) (e) computing a cipher point (X

_{c},Y

_{c},Z

_{c}) as (X

_{c},Y

_{c},Z

_{c})=(X

_{m},Y

_{m},Z

_{m})+k

_{SPr}(k

_{RPr}(X-

_{B},Y

_{B},Z

_{B})); (f) embedding a second secret message bit string into a data transformation index E

_{m}; (g) transforming the cipher point coordinates X

_{c}and Z

_{c}as {circumflex over (X)}

_{C}=X

_{C}(E

_{b}

^{e}

^{RP}r)

^{e}

^{s}Pr and {circumflex over (Z)}

_{C}=Z

_{CE}

_{m}, respectively; (h) calculating a cipher transformation index E

_{c}as

**E c**= ( E b e R Pr ) e S Pr E m ; ##EQU00046##

**and**(i) sending a set of appropriate bits of {circumflex over (X)}

_{c}, {circumflex over (Z)}

_{c}and E

_{c}to the receiving correspondent.

**[0104]**The receiving correspondent then performs the following steps: (j) calculating the shared key as (k

_{RPr}(k

_{SPr}(X

_{B}, Y

_{B},Z

_{B})),(E

_{b}

^{e}.sup.SPr)

^{e}

^{RP}r); (k) calculating the data transformation index E

_{m}as

**E m**= ( E b e RPr ) e SPr E c ; ##EQU00047##

**(l) calculating the cipher point coordinates X**

_{c}and Z

_{c}as X

_{C}={circumflex over (X)}

_{C}((E

_{b}

^{e}

^{RP}r)

^{e}.sup.SPr)

^{-1}and Z

_{C}={circumflex over (Z)}

_{CE}

_{m}

^{-1}, respectively; (m) computing the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}) as (X

_{m},Y

_{m},Z

_{m})=(X

_{c},Y

_{c},Z

_{c})-k

_{RPr}(k

_{SPr}(X-

_{B}, Y

_{B}, Z

_{B})); and (n) retrieving the first secret message bit string from the elliptic curve message point (X

_{m},Y

_{m},Z

_{m}).

**[0105]**As in the previous embodiment, preferably, the shared number E

_{b}and the data transformation index E

_{m}are selected to be powers of a common base μ, i.e., E

_{b}=μ

^{e}

^{b}and E

_{m}=μ

^{e}

^{m}. Thus, E

_{c}=μ

^{e}

^{c}where e

_{m}is used for embedding the message and e

_{c}is sent. Preferably, μ is a power of two.

**[0106]**In conventional elliptic curve cryptography, encryption and decryption, the message data bits are embedded in only the affine x-coordinate x

_{m}of the elliptic curve points. Further, given an elliptic curve defined over F(p) that needs N bits for the representation of its elements, each x-coordinate x, carries only (N-L) bits of the message data bits. Thus, at least one inversion or division over F(p) (i.e., one modulo p inversion or division) is needed per (N-L)-bit encryption.

**[0107]**In the present method, the encryption of more than (2N-L) bits of the message data is achieved per one inversion or division over F(p), i.e., per one modulo p inversion or division. This is achieved by first defining an elliptic curve group over addition in projective coordinates, which allows the embedding of one part of the message data bit-string in both the X-coordinate and the Z-coordinate of the elliptic curve points, where Xand Z are elements of F(p) represented in N-bit strings; and second, transforming the cipher point to an isomorphic curve that is determined by the second part of the message data bit-string. In the present method, the relevant bits of both the X- and Z-coordinates of the transformed cipher point, as well as the bits of the ciphered transformation index E

_{C}, are sent to the receiver.

**[0108]**At the receiving entity, the message bits are recovered from X- and Z-coordinates of the cipher point, as well as the bits of the ciphered transformation index E

_{C}, which is achieved using one inversion or division over F(p) (i.e., one modulo p inversion or division).

**[0109]**Further, in the present method, an additional projective coordinate is used at the sending and receiving entities to eliminate the inversion or division during each addition and doubling operation of the scalar multiplication. Thus, up to (3N-L) bits of the message data can be encrypted (and subsequently decrypted) using one inversion or division. The use of embedding in the X- and Z-coordinates of an elliptic curve point, combined with the embedding in the transformation index, increases the number of points that satisfy an elliptic curve equation, which can then be used in the corresponding cryptosystem, such that the number of points is proportional to p

^{3}rather than p. Thus, for the same number of embedded bits, a smaller p can be used when embedding in the X- and Z-coordinates, as well as the transformation index, than when embedding only in the x-coordinate. This results in faster implementations and reduced power consumption.

**[0110]**In the method of performing enhanced XZ-elliptic curve cryptography, the steps of embedding include the following steps: (a) defining the respective message bit string as an M-bit string, where M is an integer such that (3N-L)>M>(2N-L), L is an integer, N represents a number of bits used to represent F(p) elements, and F(p) represents a finite field containing the elliptic curve set EC

^{3}, where p represents a set of points on EC

^{3}; (b) dividing the respective message bit string into three strings m

_{1}, m

_{2}and m

_{3}, where the length of string m

_{1}is less than or equal to (N-L) bits, the length of string m

_{2}is less than or equal to (N-1) bits, and the length of string m

_{3}is less than or equal to N bits; (c) assigning the value of the bit string m

_{3}to E

_{m}; (d) assigning the value of the bit string m

_{2}to Z

_{m}by first assigning the value of the bit string m

_{2}to R

_{m}, then using a Legendre test to determine if R

_{m}has a square root, and then, if R

_{m}has a square root, setting Z

_{m}=R

_{m}and if R

_{m}does not have a square root, then setting Z

_{m}=gR

_{m}, where g is non-quadratic residue in F(p); (e) computing aZ

_{m}

^{2}and bZ

_{m}

^{3}, where a and b are selected scalars; (f) assigning the value of the bit string m

_{1}to X

_{m}; (g) computing a value T as T=X

_{m}

^{3}+(aZ

_{m}

^{2})X

_{m}+(bZ

_{m}

^{3}) and using a Legendre test to determine if T has a square root; and (h) assigning the square root of T to Y

_{m}if T has a square root, and incrementally increasing X

_{m}and returning to step (g) if T does not have a square root.

**[0111]**The Legendre Symbol is used to test whether an element of F(p) has a square root or not, i.e., whether an element is quadratic residue or not. The Legendre Symbol and test are as follows. Given an element of a finite field F(p), such as d, the Legendre symbol is defined as

**( d p ) . ##EQU00048##**

**In order to test whether d is quadratic residue or not**, the Legendre symbol,

**( d p ) , ##EQU00049##**

**is computed such that**:

**( d p ) = { + 1 if x is a quadratic residue 0 if x ≡ 0 mod F ( p ) - 1 otherwise . ##EQU00050##**

**[0112]**In the above, it should be noted that p is usually predetermined prior to encryption, thus the value of g can also be predetermined. When using the embedding method given above, the strings m

_{1}, m

_{2}and m

_{3}can be recovered directly from X

_{m}, Z

_{m}and E

_{m}, respectively. An extra bit is needed to identify whether R

_{m}or gR

_{m}is used for Z

_{m}at the receiver. Therefore, to encode (N-1) message data bits, one needs to send N bits for the Z values.

**[0113]**Any non-quadratic value in F(p) can be used for g. For efficiency, g is chosen to be -1 for p≡3 mod 4 or when p≡1 mod 4.

**[0114]**At the receiver, the process is reversed. In the case of g=2, a division by 2 is carried out. It should noted that dividing R

_{m}by two is computed using one modulo addition, since:

**[0115]**(i) R

_{m}/2=((R

_{m}-(R

_{m}) mod 2)/2)+(R

_{m}) mod 2*(1/2) mod p;

**[0116]**(ii) (R

_{m})mod 2 is the least significant bit of R

_{m}; and

**[0117]**(iii) (1/2)mod p=(p+1)/2.

**[0118]**The security of the password protocols depends on the security of the underlying elliptic polynomial cryptography. The security of elliptic polynomial cryptosystems is assessed by both the effect on the solution of the elliptic curve discrete logarithmic problem (ECDLP) and power analysis attacks.

**[0119]**It is well known that the elliptic curve discrete logarithm problem (ECDLP) is apparently intractable for non-singular elliptic curves. The ECDLP problem can be stated as follows: given an elliptic curve defined over Fthat needs N-bits for the representation of its elements, an elliptic curve point (x

_{p,y}

_{p})εEC, defined in affine coordinates, and a point (x

_{Q},y

_{Q})εEC, defined in affine coordinates, determine the integer k, 0≦S≦#k , such that (x

_{Q},y

_{Q})=k(x.sub.P,y.sub.P), provided that such an integer exists. In the below, it is assumed that such an integer exists.

**[0120]**Various methods of pre-conditioning the data have been proposed for different requirements. Any scheme which guarantees the uselessness of acquiring a partial message is applicable to the present method. One way to achieve this behavior is through the "All-or-Nothing Transformation" (AONT), which is defined as a keyless transformations that maps a sequence of blocks B

_{1}to another sequence of blocks B

_{2}such that a missing block of B

_{2}will totally prevent reproducing B

_{1}partially or fully, or obtaining any useful information about it.

**[0121]**Another method of achieving this is to multiply the message data as a vector by a matrix T in order to obtain a transformed vector as follows:

**m**

_{t}=T m

_{o}, (75)

**where T is of size S**

_{t}×S

_{r}elements, m

_{0}and m

_{t}are the original and the transformed message data vector, respectively, which are of length S

_{t}elements, and where bit length S

_{t}≧(3N-L). Then, m

_{t}would be used for embedding instead of m

_{o}. With the matrix T chosen properly, the partial knowledge of m

_{t}is not enough to obtain any useful part of m

_{o}.

**[0122]**The most well-known attack used against the ECDLP is the Pollard ρ-method, which has a complexity of O( {square root over (πK)}/2), where K is the order of the underlying group, and the complexity is measured in terms of an elliptic curve point addition.

**[0123]**Since the underlying cryptographic problems used in the above block cipher chaining methods is the discrete logarithm problem, which is a known difficult mathematical problem, it is expected that the security of the above methods are more secure than prior art ciphers which are not based on such a mathematically difficult problem.

**[0124]**Projective coordinates can also be used by the sending correspondent and the receiving correspondent to embed extra message data bits in the projective coordinate, wherein the addition of the corresponding elliptic points is defined in (nx+ny+3) dimensional space where there are (nx+1) x-coordinates, (ny+1) y-coordinates and one projective coordinate.

**[0125]**The equations for the addition rule can be obtained by using the elliptic polynomial equation with (nx+1) x-coordinates and (nx+1) y-coordinates in projective coordinates and substituting a straight line equation to obtain a cubic equation in terms of one of the x-coordinates.

**[0126]**This cubic equation can be used to identify the third point of intersection between a straight line and the elliptic polynomial in (nx+ny+3) dimensions given two other intersection points. This third point of intersection is used to identify the sum of the given two points.

**[0127]**For the present method, the ECDLP in EC

^{3}can be stated as follows: given a point (X.sub.P,Y.sub.P,Z.sub.P)εEC

^{3}and a point (X

_{Q},Y

_{Q},Z

_{Q})εEC

^{3}defined in projective coordinates, find k such that (X

_{Q},Y

_{Q},Z

_{Q})=k(X

_{p},Y

_{p},Z

_{p}). In EC

^{3}, the modified Pollard p-method can be formulated as follows. Find two points:

**(X**

_{i},Y

_{i}Z

_{i})=A

_{i}(X

_{Q},Y

_{Q},Z

_{Q})+B

_{i}k(X.sub- .P,Y.sub.P,Z.sub.P) and

**(X**

_{j},Y

_{j},Z

_{j})=A

_{j}(X

_{Q},Y

_{Q},Z

_{Q})+B

_{j}k(X.su- b.P,Y.sub.P,Z.sub.P)

**such that**(X

_{i},Y

_{i},Z

_{i})=(X

_{j},Y

_{j},Z

_{j}), and hence

**k**= A i + A j B i + B j , ##EQU00051##

**and given that all the points are members of EC**

^{3}.

**[0128]**It is clear that the complexity of the Pollard ρ-method in EC

^{3}is not less than the complexity of the Pollard ρ-method in EC

^{2}for the same group order. It should also be noted that since EC

^{3}encryption and EC

^{2}encryption are generated by the same elliptic curve, all the analysis of the security of EC

^{2}cryptography will be applicable to the analysis of the security of EC

^{3}cryptography. Moreover, the introduction of the isomorphic transformation indexed by the three transformation indices has an effect of hiding the original curve on which data has been originally ciphered, which makes cryptanalysis even harder.

**[0129]**The third projection described above can be used to enhance the more general elliptic polynomial cryptography, provided that the first projection has been applied to the polynomial. An alternative form of the elliptic polynomial equation with more than one x-coordinate and one or more y-coordinates is used, with the equation following these conditions: some of the variables (i.e., the y-coordinates) have a maximum degree of two; other variables (i.e., the x-coordinates) have a maximum degree of three; a monomial cannot contain an x-coordinate variable and a y-coordinate variable; all monomials that contain x-coordinates must have a degree of three or less; and all monomials that contain y-coordinates must have a degree of two.

**[0130]**Letting S

_{nx}represent the set of numbers between 0 and n in x (i.e., S

_{nx}{0, . . . , nx}) and letting S

_{ny}represent the set of numbers between 0 and n in y (i.e., S

_{ny}={0, . . . , ny}), and letting (nx+ny) be greater than or equal to one, then, given a finite field F, the following equation defined over F is one example of the polynomial equation described above:

**k**.di-elect cons. S ny a 1 k y k 2 + k , l .di-elect cons. S ny , l ≠ k a 2 kl y k y l = l .di-elect cons. S nx b 1 l x l 3 + l , k .di-elect cons. S nx , l ≠ k b 2 lk x l 2 x k + l , k , m .di-elect cons. S nx , l ≠ k ≠ m b 3 lkm x l x k x m + l , k .di-elect cons. S nx b 4 lk x l x k + k .di-elect cons. S nx b 5 k x k + b 6 , ( 76 ) ##EQU00052##

**where a**

_{1}l,a

_{2}kl,b

_{1}l, b

_{2}lk,b

_{3}lkm, b

_{4}lk,b

_{5}l,b

_{6}εF.

**[0131]**By applying the first projection, given by

**y i**= Y i Z 3 2 and x i = X i Z ##EQU00053##

**for all i**, equation (76) becomes:

**k**.di-elect cons. S ny a 1 k Y k 2 E s 3 + k , l .di-elect cons. S ny , l ≠ k a 2 kl Y k Y l E s 3 = l .di-elect cons. S nx b 1 l X l 3 E s 3 + l , k .di-elect cons. S nx , l ≠ k b 2 lk X l 2 X k E s 3 + l , k , m .di-elect cons. S nx , l ≠ k ≠ m b 3 lkm X l X k X m E s 3 + l , k .di-elect cons. S nx b 4 lk X l X k ZE s 2 E m E c + k .di-elect cons. S nx b 5 k X k Z 2 E s E m 2 E c 2 + b 6 Z 3 E m 3 E c 3 . ( 77 ) ##EQU00054##

**Then**, the following substitutions can be applied:

_{i}=Y

_{i}E

_{s}

^{3}/2; {circumflex over (X)}

_{i}=X

_{i}E

_{s}; {circumflex over (Z)}=ZE

_{m};{circumflex over (b)}

_{4}lkE

_{c};{circumflex over (b)}

_{5}l=b

_{5}lE

_{c}

^{2};{circumflex over (b)}

_{6}lE

_{c}

^{3}, for all i, l, k, and m, while a

_{1}l,a

_{2}klb

_{1}l,b

_{2}lk,b

_{3}lkm remain unchanged. The resulting equation is as follows:

**k**.di-elect cons. S ny a 1 k Y k 2 + k , l .di-elect cons. S ny , l ≠ k a 2 kl Y k Y l = l .di-elect cons. S nx b 1 l X l 3 + l , k .di-elect cons. S nx , l ≠ k b 2 lk X l 2 X k + l , k , m .di-elect cons. S nx , l ≠ k ≠ m b 3 lkm X l X k X m + l , k .di-elect cons. S nx b 4 lk X l X k Z + k .di-elect cons. S nx b 5 k X k Z 2 + b 6 Z 3 , ( 78 ) ##EQU00055##

**which is isomorphic to the polynomial described above**. Thus, any point on one of these curves can be transformed to an isomorphic point on another curve. Symmetric key cryptography, public key cryptography and digital signatures can then be applied in the same manner described above.

**[0132]**It should be understood that the calculations may be performed by any suitable computer system, such as that diagrammatically shown in the sole drawing Figure. Data is entered into system 100 via any suitable type of user interface 116, and may be stored in memory 112, which may be any suitable type of computer readable and programmable memory. Calculations are performed by processor 114, which may be any suitable type of computer processor and may be displayed to the user on display 118, which may be any suitable type of computer display.

**[0133]**Processor 114 may be associated with, or incorporated into, any suitable type of computing device, for example, a personal computer or a programmable logic controller. The display 118, the processor 114, the memory 112 and any associated computer readable recording media are in communication with one another by any suitable type of data bus, as is well known in the art.

**[0134]**Examples of computer-readable recording media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or a semiconductor memory (for example, RAM, ROM, etc.). Examples of magnetic recording apparatus that may be used in addition to memory 112, or in place of memory 112, include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT). Examples of the optical disk include a DVD (Digital Versatile Disc), a DVD-RAM, a CD-ROM (Compact Disc-Read Only Memory), and a CD-R (Recordable)/RW.

**[0135]**It is to be understood that the present invention is not limited to the embodiments described above, but encompasses any and all embodiments within the scope of the following claims.

User Contributions:

Comment about this patent or add new information about this topic: