Skip to main content

Itoh–Tsujii Inversion Algorithm

  • Reference work entry
  • 227 Accesses

Originally introduced in [5], the Itoh and Tsujii algorithm (ITA) is an exponentiation-based algorithm for inversion in finite fields which reduces the complexity of computing the inverse of a non-zero element in GF(2n), when using a normal basis representation, from \(n-2\) multiplications in GF(2n) and \(n-1\) cyclic shifts using the binary exponentiation method to at most \(2 \lfloor\log_2(n-1)\rfloor\) multiplications in GF(2n) and \(n-1\) cyclic shifts. As shown in [4], the method is also applicable to finite fields with a polynomial basis representation.

For the discussion that follows, it is important to point out that there are several possibilities to represent elements of a finite field. Thus, in general, given an irreducible polynomial \(P(x)\) of degree m over \(GF(q)\) and a root \(\alpha\) of \(P(x)\) (i.e., \(P(\alpha) = 0\)), one can represent an element \(A \in GF(q^m)\), \(q=p^n\) and p prime, as a polynomial in \(\alpha\), i.e., as \(A = a_{m-1} \alpha^{m-1} +...

This is a preview of subscription content, log in via an institution.

References

  1. Chung, Jae Wook, Sang Gyoo Sim, and Pil Joong Lee (2000). “Fast Implementation of Elliptic Curve Defined over GF(p m) on CalmRISC with MAC2424 Coprocessor.” Workshop on Cryptographic Hardware and Embedded Systems—CHES 2000, Lecture Notes in Computer Science, vol. 1965, eds. C.K. Koc and C. Paar. Springer-Verlag, Berlin, 57–70.

    Google Scholar 

  2. De Win, E., A. Bosselaers, S. Vandenberghe, P. De Gersem, and J. Vandewalle (1996). “A fast software implementation for arithmetic operations in GF(2n).” Advances in Cryptography—ASIACRYPT'96, Lecture Notes in Computer Science, vol. 1233, eds. K. Kim and T. Matsumoto. Springer-Verlag, Berlin, 65–76.

    Google Scholar 

  3. Guajardo, J. and C. Paar (1997). “Efficient algorithms for elliptic curve cryptosystems.” Advances in Cryptology—CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, ed. B. Kaliski. Springer-Verlag, Berlin, 342–356.

    Google Scholar 

  4. Guajardo, J. and C. Paar (2002). “Itoh–Tsujii inversion in standard basis and its application in cryptography and codes.” Design, Codes, and Cryptography, 25 (2), 207–216.

    Article  MATH  MathSciNet  Google Scholar 

  5. Itoh, T. and S. Tsujii (1988). “A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases.” Information and Computation, 78, 171–177.

    Article  MATH  MathSciNet  Google Scholar 

  6. Lidl, R. and H. Niederreiter (1997). Finite Fields, Encyclopedia of Mathematics and its Applications, vol. 20 (2nd ed.). Cambridge University Press, Cambridge.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Guajardo, J. (2005). Itoh–Tsujii Inversion Algorithm. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_212

Download citation

Publish with us

Policies and ethics