Tricks for arithmetic modulo NIST primes

The US National Institute of Standards and Technology (NIST) originally recommended 15 elliptic curves for use in elliptic curve cryptography [1].

Ten of these are over a field of size 2n.

The other five are over prime fields.

The sizes of these fields are known as the NIST primes.

The NIST curves over prime fields are named after the number of bits in the prime: the name is “P-” followed by the number of bits.

The primes themselves are named p with a subscript for the number of bits.

The five NIST primes arep192 = 2192 – 264 – 1 p224 = 2224 – 296 + 1 p256 = 2256 – 2244 + 2192 + 296 – 1 p384 = 2384 – 2128 – 296 + 232 – 1 p521 = 2521 – 1The largest of these, p521, is a Mersenne prime, and the rest are generalized Mersenne primes.

Except for p521, the exponents of 2 in the definitions of the NIST primes are all multiples of 32 or 64.

This leads to efficient tricks for arithmetic modulo these primes carried out with 32-bit or 64-bit integers.

You can find pseudocode implementations for these tricks in Mathematical routines for the NIST prime elliptic curves.

Related postsNIST P-384Naming conventions for elliptic curve cryptography[1] FIPS PUB 186-4.

This publication is dated 2013, but the curve definitions are older.

I haven’t found for certain when the curves were defined.

I’ve seen one source that says 1997 and another that says 1999.

.

. More details

Leave a Reply