In the tables above give the overall cost of opera-
tions in each the tower fields.
We found that the cost of multiplication is the same
for any path chosen, however the cost of squaring and
inversion change on the path, so we can see that the
minimal cost for squaring is 150m (path 6) and in-
version is 639m+12s+i (path 1), so to find the better
path we shall calculate the cost of miller algorithm
taking S= 0.8Mand I= 40Min path 1 and 6, we
have:
On path 1: (1964,6l+1944p+2308,8)m.
On path 6: (1892l+1944p+2235).
So we found that the optimal path to do this calcu-
lation is when we chose the sixth path, so the best
path for tower building the elliptic curve of embed-
ding degree 36 is:
Fp−→ Fp3−→ Fp9−→ Fp18 −→ Fp36
In this paper, we give some methods for tower build-
ing of extension of finite field of embedding degree
36. We show that there is three efficients construc-
tions of these extensions of degree 36. We show that
by using a degree 2 or 3 twist we handle to perform
most of the operations in Fpor Fp9or in Fpor Fp6.
By using this tower building technique, we also im-
prove the arithmetic of Fp6and Fp9in order to get
better results of calculate the cost of their multiplica-
tion, squaring and inversion, and found the optimal
path for tower building this field with the minimal
cost.
References:
[1] Victor S. Miller. Use of elliptic curves in cryp-
tography. Crypto 1985, LNCS 218, pp. 417-
426, 1985.
[2] Neal Koblitz. Elliptic curve cryptosystems.
Mathematics of Computation, Vol. 48, No. 177,
pp. 203-209, 1987.
[3] R.L. Rivest, A. Shamir, and L.M. Adleman. A
method for obtaining digital signatures and pub-
lickey cryptosystems. Commun. ACM, Vol. 21,
No. 2, pp. 120-126, 1978.
[4] Whelan, C., Scott, M.: The Importance of the
Final Exponentiation in Pairings When Consid-
ering Fault Attacks. In: Takagi, T., Okamoto,
T., Okamoto, E., Okamoto, T. (eds.) Pairing
2007. LNCS, vol. 4575, pp. 225-246. Springer,
Heidelberg (2007).
[5] Nadia El Mrabet, Nicolas Guillermin, and So-
rina Ionica. A study of pairing computation for
curves with embedding degree 15. DBLP vol-
ume 2009.
[6] Nadia El Mrabet and Marc Joye. GUIDE TO
PAIRING-BASED CRYPTOGRAPHY. Chap-
man and Hall/CRC CRYPTOGRAPHY AND
NETWORK SECURITY, 2018.
[7] Emmanuel Fouotsa, Nadia El Mrabet and Am-
inatou Pecha. Optimal Ate Pairing on Ellip-
tic Curves with Embedding Degree 9; 15 and
27. journal of Groups, Complexity, Cryptology,
Volume 12, issue 1 (April 17, 2020) gcc:6285
[8] Narcisse Bang Mbiang, Diego De Freitas
Aranha, Emmanuel Fouotsa. Computing the
optimal ate pairing over elliptic curves with em-
bedding degrees 54 and 48 at the 256-bit secu-
rity level. Int. J. Applied Cryptography, Vol. 4,
No. 1, 2020.
[9] Md. Al-Amin Khandaker, Taehwan Park, Ya-
suyuki Nogami, and Howon Kim, Member, KI-
ICE. A Comparative Study of Twist Property
in KSS Curves of Embedding Degree 16 and
18 from the Implementation Perspective. J. lnf.
Commun. Converg. Eng. 15(2): 97-103, Jun.
2017.
[10] Md. Al-Amin Khandaker, Yasuyuki NOGAMI.
Isomorphic Mapping for Ate-based Pairing
over KSS Curve of Embedding Degree 18.
10.1109/CANDAR.2016.0113 November
2016.
[11] Rahat Afreen, S.C. Mehrotra. A REVIEW ON
ELLIPTIC CURVE CRYPTOGRAPHY FOR
EMBEDDED SYSTEMS. International Jour-
nal of Computer Science & Information Tech-
nology (IJCSIT), Vol 3, No 3, June 2011.
[12] Md. Al-Amin Khandaker, Yasuyuki NOGAMI.
A Consideration of Towering Scheme for Ef-
ficient Arithmetic Operation over Extension
Field of Degree 18. 19th International Confer-
ence on Computer and Information Technol-
ogy, December 18-20, 2016, North South Uni-
versity, Dhaka, Bangladesh.
5. Conclusion
WSEAS TRANSACTIONS on COMPUTERS
DOI: 10.37394/23205.2022.21.39
Ismail Assoujaa, Siham Ezzouak, Hakima Mouanis