The present invention generally relates to a scheme for arithmetic operations in finite fields, and more particularly, to a computational scheme for arithmetic operations in finite fields of characteristic 2 such as GF(2m), where m is a composite number, which is to be utilized in realizing error correction coding.
An error correction code is an algorithm for expressing a sequence of numbers such that any errors which are introduced may be detected and corrected (within certain limitations) based on the remaining numbers. The study of error correction codes and the associated mathematics is known as coding theory. The commonly used error correction codes in digital communications and data storage may include BCH (Bose-Chaudhuri-Hochquenghem) codes, Reed-Solomon codes (which are a subset of BCH codes), turbo codes, and the like.
Error correction codes are often defined in terms of Galois or finite field arithmetic. A Galois field is commonly identified by the number of elements which the field contains. The elements of a Galois field may be represented as polynomials in a particular primitive field element, with coefficients in the prime subfield. Since the number of elements contained in a Galois field is always equal to a prime number, q, raised to a positive integer power, m, the notation GF(qm) is commonly used to refer to the finite field containing qm elements. In such a field all operations between elements comprising the field yield results which are each elements of the field.
Finite fields of characteristic 2 are important because these fields have data structures suitable for computers and may be utilized in error correction coding and cryptography. Conventionally, inverse calculation over a finite field with characteristic 2 may require an enormous amount of calculations compared with multiplication. For example, a well-known method for calculating inverses in a finite field follows directly from the cyclic structure of such a field that the inverse of a field element may be obtained directly from exponentiation. To be more precise:
a−1=a−2+2
A person skilled in the art will recognize that this operation may be accomplished with 2n−3 multiplications. Logic circuits for inverse operation based on such a method may thus have large depth and- complexity. The depth of a logic circuit is the maximal number of logic elements in a path from a circuit input to a circuit output. The depth may determine the delay of the circuit. The complexity of a logic circuit is the number of logic elements in the circuit. The logic elements may have two inputs and one output.
Therefore, it would be desirable to provide a method for constructing logic circuits of small depth and complexity for operation of inversion in finite fields of characteristic 2.
Accordingly, the present invention is directed to a method for constructing a logic circuit for inversion in finite field GF(2m), where m=nk, and k, n are coprime numbers, using bases in subfields GF(2n) and GF(2k). The present invention may be applied to error correction codes, including BCH codes, Reed-Solomon codes (which are a subset of BCH codes), turbo codes, and the like.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed. The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate an embodiment of the invention and together with the general description, serve to explain the principles of the invention.
The numerous advantages of the present invention may be better understood by those skilled in the art by reference to the accompanying figures in which:
Reference will now be made in detail to the presently preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings.
One aspect of the present invention is directed to a method for constructing a logic circuit for inversion in finite field GF(2m), where m=nk, and k, n are coprime numbers, from its subfield GF(2n). The advantage of this method may lie in the fact that the structure of the subfield may remain accessible to direct manipulation when this type of construction is used. Furthermore, arithmetic operations defined in GF(2m) may be directly calculated in terms of arithmetic operations, including addition, multiplication, square, inversion, division, and the like, performed in the constituent subfield GF(2n).
According to one aspect of the present invention, logic circuits of small depth and complexity for operation of inversion in finite fields of characteristic 2 may be constructed. The depth of a logic circuit is the maximal number of logic elements in a path from a circuit input to a circuit output. The logic elements may include an exclusive OR unit (for addition), a multiplication unit (for multiplication), a square unit (for square, an inverse calculation unit (for inversion), and the like. The depth may determine the delay of the circuit. The complexity of a logic circuit is the number of logic elements in the circuit. The logic elements may have two inputs and one output. The logic circuit constructed according to the present invention may have less depth and complexity than the logic circuit constructed according to the conventional methods if the bases of the finite fields have a dimension less than 32.
The present invention may be applied to error correction codes, including BCH codes, Reed-Solomon codes (which are a subset of BCH codes), turbo codes, and the like because all devices for encoding and decoding may contain modules for multiplication and inversion.
The method of the present invention will be described in detail below.
Denote a polynomial basis in the field GF(2n)
Bα={1,α,α2,α3, . . . ,αn−1},
where
p(α)=0,p(x)=pn−1xn−1+ . . . +p0,pi=0,1
and p(x) is an irreducible polynomial (minimal polynomial of element α-base generator).
Denote a normal basis in the field GF(2n)
Bα={α,α2,α4,α8,α16, . . . ,α2
Normal bases may exist only for some irreducible polynomials p(x).
Normal bases may have such an advantage that squaring of these bases is equivalent to a shift operation:
(x0α+x1α2+ . . . xn−1α2
Let
be any elements of the field GF(2n), then their product (multiplication) may be represented by the equality:
and ti,j is a multiplication table of the given basis.
If one defines a matrix A as ai,j=ti−j,−j, where i−j and −j are a subtraction modulo n, then the foregoing formulas may be represented as
where Sm is a shift of the vector on m component, and
is a bilinear form associated with the matrix A.
Let m=nk, where k, n are coprime numbers. One may choose in fields GF(2n), GF(2k) any normal bases
Bα={α,α2,α4,α8,α16, . . . ,α2
Bβ={β,β2,β4,β8,β16, . . . ,β2
Then the product of these bases
Bαβ={αβ,αβ2, . . . ,αβ2
is some permutation of some normal bases in the field GF(2m).
Let k=2 and n does not divide by 2. One may use in the field GF(22n) a basis
Bαβ={αβ,αβ2, . . . ,αβ2
which is a product of the optimal normal base of order 2
Bα={α,α2,}, α+α2=1,
and any normal (or standard polynomial) basis Bβ.
In field GF(2n) the norm N of any element
x0α+x1α2εGF(2m)
is equal to
The equality for an operation of inversion in the field GF(22n) is
(x0α+x1α2)−1=(x0α2+x1α)/N=(x1/N)α+(x0/N)α2
As shown in
Recurrent upper bound of the complexity of an inversion is
L(I(2n))≦L(I(n))+2L(M(n))+L(N(2n)),
where L(N(2n)) is the complexity of the norm, and L(M(n)) is the complexity of multiplication in the field GF(2n).
Recurrent upper bound of the depth of inversion is
D(I(2n))≦D(I(n))+D(M(n))+D(N(2n)).
Valid estimation of the complexity and the depth of norm N may be as follows:
L(N(2n))≦L(M(n))+2L(K(n))+n,
D(N(2n))≦D(M(n))+1,
where L(K(n)) is the complexity of squaring in the base Bβ of the field GF(2n). If Bβ is a normal basis, then L(K(n))=0, and
L(N(2n))=L(M(n)),
D(N(2n))=D(M(n))
in many practical cases.
Multiplication may be represented by the formula
(x0α+x1α2)(y0α+y1α2)=(x1y0+(x1+x0)y1)α+(x1y0+x0(y0+y1))α2
Recurrent upper bounds of the complexity and the depth of multiplication are
L(M(2n))≦3L(M(n))+4n,
D(M(2n))≦D(M(n))+2.
Let k=3, and n does not divide by 3. One may use in the field GF(23n) a basis
Bαβ={αβ,αβ2, . . . ,αβ2
which is a product of the optimal normal basis of order 3
Bα={α,α2,α4},α2+α3=1
and any normal (or standard polynomial) basis Bβ.
In field GF(2n) the norm N of any element
(x0α+x1α2+x2α4)εGF(q3),q=2n,xiεGF(q)
is
Inversion of any element
(x0α+x1α2+x2α4)εGF(q3),xiεGF(q)
may be represented by the equality
(x0α+x1α2+x2α4)−1=(x1α+x2α2+x0α4)(x2α+x0α2+x1α4)/N
where
(x1α+x2α2+x0α4)(x2α+x0α2+x1α4)=((x0+x2)2+x1x2)α+((x1+x0)2+x0x2)α2+((x1+x2)2+x1x0)α4
This equality demonstrates that coordinates Xi of inverse element (x0α+x1α2+x2α4)−1 may be shifted if coordinates xi are shifted.
Referring now to
The 3n-bit inverse calculation device 200 may calculate the inverse E−1=[((x0+x2)2+x1x2)/N]α+[((x1+x0)2+x0x2)/N]α2+[((x1+x2)2+x1x0)/N]α4=(z0/N)α+(z1/N)α2+(z2/N)α4εGF(23n) of an element E=(x0α+x1α2+x2α4)εGF(23n) by using arithmetic operations in a subfield GF(2n). First, a 3n-bit input E may be split into three n-bit parts x0, x1 and x2. An 202 may have x0 and x2 as inputs and output t1=x0+x2. Sn 214 may have t1 as an input and output t7=t12=(x0+x2)2, which may become inputs to An 222 and Mn 230. An 204 may have x0 and x1 as inputs and output t2=x0+x1, which may become inputs to Sn 216 and Mn 230. Sn 216 may have t2 as an input and output t8=t22=(x0+x1)2, which may become an input to An 224. An 206 may have x1 and x2 as inputs and output t3=x1+x2, which may become inputs to Sn 218 and Mn 228. Sn 218 may have t3 as an input and output t9=t32=(x1+x2)2, which may become inputs to An 226 and Mn 228.
Mn 208 may have x0 and x1 as inputs and output t4=x0x1, which may become an input to An 226. Mn 210 may have x1 and x2 as inputs and output t5=x1x2, which may become an input to An 222. Mn 212 may have x0 and x2 as inputs and output t6=x0x2, which may become inputs to An 224 and Mn 220. Mn 220 may have x1 and t6 as inputs and output t13=x1t6=x0x1x2, which may become an input to An 234.
An 222 may receive t5 and t7 as inputs and output z0=(x0+x2)2+x1x2. An 224 may receive t6 and t8 as inputs and output z1=(x1+x0)2+x0x2. An 226 may receive t4 and t9 as inputs and output z2=(x1+x2)2+x1x0.
Mn 228 may have t3 and t9 as inputs and output t10=t3t9=(x1+x2)(x1+x2)2=(x1+x2)3, which may become an input to An 232. Mn 230 may have t2 and t7 as inputs and output t11=t2t7=(x0+x1)(x0+x2)2, which may become an input to An 232. An 232 may have t10 and t11 as inputs and output t12=t10+t11=(x1+x2)3+(x0+x1)(x0+x2)2, which may become an input to An 234. An 234 may have t12 and t13 as inputs and output N=t12+t13=(x1+x2)3+(x0+x1)(x0+x2)2+x0x1x2.
After z0, z1, z2, and N are obtained, those of ordinary skill in the art will understand how to obtain the inverse E−1=(z0/N)α+(z1/N)α2+(z2/N)α4εGF(23n). For example, an n-bit inverse calculation unit (In) may be provided, which may have N as an input and output 1/N. Three additional n-bit multiplication units (Mn) may also be applied: the first Mn may have z0 and 1/N as inputs and output z0/N; the second Mn may have z1 and 1/N as inputs and output z1/N; the third Mn may have z2 and 1/N as inputs and output z2/N. The obtained z0/N, z1/N and z2/N may then be joined and outputted as the inverse E−1, which is in 3n bits.
From the equality
and assuming D(M(n))≧D(K(n))+2, upper bounds may be obtained:
L(N(3n))≦4L(M(n))+2L(K(n))+4n,
D(N(3n))≦2D(M(n))+1.
By realizing together with N operators
(x0+x2)2+x1x2
(x1+x0)2+x0x2
(x1+x2)2+x1x0
and parallel executing three times multiplication on N−1, estimations for the complexity and the depth of inversion in the field GF(23n) are:
L(I(3n))≦L(I(n))+9L(M(n))+3L(K(n))+8n,
D(I(3n))≦D(I(n))+3D(M(n))+1;
and
L(I(3n))≦L(I(n))+6L(M(n))+L(N(3n)+3L(K(n))+6n,
D(I(3n))≦D(I(n))+D(M(n))+D(N(3n)).
If Bβ is a normal basis, then L(K(n))=0.
In a partial case x1 εGF(2), the equality x12=x1 is valid, and consequently one may have the norm
where V represents a logical disjunction. The norm of nonzero elements in this case is equal to 1, so the inversion
(x0α+x1α2+x2α4)−1
may be represented by the equalities:
(x0+x2)2+x1x2=x0+x2+x1x2=x0+x2x1,
(x1+x0)2+x0x2=x1+x0+x0x2=x1+x0x2,
(x1+x2)2+x1x0=x1+x2+x1x0=x2+x1x0.
Consequently the complexity and the depth in this case have bounds:
L(I(3))≦6,
D(I(3))≦2.
Multiplication in a given basis Bα may be represented as follows:
If the following brief notations are used,
[i,j]=(xi+xj)(yi+yj), (i,j)=(xiyj+xjyi), (i)=xiyi,
then
[i,j]=(i,j)+(i)+(j)
The multiplication equality may thus be rewritten as
((x0y1+x1y0)+(x1y2+x2y1)+x2y2)=(0,1)+(1,2)+(2)==[0,1]+[1,2]+(0),
((x0y2+x2y0)+(x1y2+x2y1)+x0y0)=(0,2)+(1,2)+(0)==[0,2]+[1,2]+(1),
((x0y1+x1y0)+(x0y2+x2y0)+x1y1)=(0,1)+(0,2)+(1)==[0,1]+[0,2]+(2).
The valid upper bounds for the complexity and the depth of multiplication are:
L(M(3n))≦6L(M(n))+12n,
D(M(3n))≦D(M(n))+3.
Let k=4, and n does not divide by 4. One may use in the field GF(24n) a basis
Bαβ={αβ,αβ2, . . . ,αβ2
which is a product of the optimal normal basis of order 4
Bα{α,α2,α4,α8}, α+α2+α3+α4=1,
and any normal (or standard polynomial) basis Bβ.
Any element
(x0α+x1α2+x2α4+x3α8)εGF(q4),xiεGF(q),q=2n,
may be inverted by the following equality:
(x0α+x1α2+x2α4+x3α8)−1=[(x1α+x2α2+x3α4+x0α8)(x2α+x3α2+x0α4+x1α8)(x3α+x0α2+x1α4+x2α8)]/N
where the norm
N=(x1α+x2α2+x3α4+x0α8)(x2α+x3α2+x0α4+x1α8)(x3α+x0α2+x1α4+x2α8) (x0α+x1α2+x2α4+x3α8)
is equal to
and the product
(x1α+x2α2+x3α4+x0α8)(x2α+x3α2+x0α4+x1α8)(x3α+x0α2+x1α4+x2α8)
is equal to
X0α+X1α2+X2α4+X3α8,
where
X0=x2(x22+m(x0,x1,x3))+x1x2(x1+x2)+x0x3(x0+x3)+x1(x0+x3)2+x0x22
X1=x3(x32+m(x2,x2,x0))+x2x3(x2+x3)+x1x0(x1+x0)+x2(x1+x0)2+x1x32,
X2=x0(x02+m(x2,x3,x1))+x3x0(x3+x0)+x2x1(x2+x1)+x3(x2+x1)2+x2x02,
X3=x1(x12+m(x3,x0,x2))+x0x1(x0+x1)+x3x2(x3+x2)+x0(x3+x2)2+x3x12,
where m (x, y, z) is a brief notation for xy+xz+yz, and ⊕ is addition modulo 4.
Coordinates Xi of a given product shift if inputs shift.
For computation of N and all Xi, one may at first compute all products xixj with the complexity of 6L(M(n)), then compute all squares xi2 with the complexity of 4L(K(n)), then compute all sums xi+xj with the complexity of 6n, then compute the formula
with the complexity L(M(n))+L(K(n))+6n and the depth of less than or equal to 2D(M(n))+2(under the condition of D(M(n))≧D(K(n))+2), then compute
with the complexity of 2L(M(n))+3n and the depth of 2D(M(n))+2, then compute
with the complexity of 5L(M(n))+n and the depth of 2D(M(n))+D(K(n))+2, and finally compute all Xi with the complexity of 12L(M(n))+20n and the depth of 2D(M(n))+3.
The total complexity of the logic circuit with outputs N and Xi may be equal to 26L(M(n))+36n+4L(K(n)), and the depth may be equal to 2D(M(n))+3+max{D(K(n)),1}.
Using the equality
may decrease the upper bound for complexity to 26L(M(n))+34n+4L(K(n)) under the condition of D(M(n))≧D(K(n))+3.
Using the equality
one may rewrite other equalities as follows
X1=x32(x1+x3+x2)+x22x3+(x3+x1+x0)m(x1,x2,x0),
X2=x02(x2+x0+x3)+x32x0+(x0+x2+x1)m(x2,x3,x1),
X3=x12(x3+x1+x0)+x02x1+(x1+x3+x2)m(x3,x0,x2).
Therefore, for computation of all Xi it is enough to use only sums x0+x3, x1+x2, and because all sums
x0+x2+x1,
x1+x3+x2,
x2+x0+x3,
x3+x1+x0
may be computed with 4 additions, thus the total complexity may decrease to 26L(M(n))+30n+4L(K(n)) with the same depth of 2D(M(n))+3+max{D(K(n)),1} (under the condition of D(M(n))≧D(K(n))+3).
Final bounds for complexity and depth may be:
L(I(4n))≦L(I(n))+30L(M(n))+4L(K(n))+30n,
D(I(4n))≦D(I(n))+3D(M(n))+3+max{D(K(n)),1}.
If Bβ is a normal basis, then
L(K(n))=D(K(n))=0
In a partial case xi εGF(2), the equality xi2xi is valid, and consequently the norm
The norm of a nonzero element in this case is equal to 1, so inversion
(x0α+x1α2+x2α4+x3α8)−1
may be represented by:
X0=a2(a0+m(a0, a1, a3))+a1(a0+a3),
X1=a3(a1+m(a1, a2, a0))+a2(a1+a0),
X2=a0(a2+m(a2, a3, a1))+a3(a2+a1),
X3=a1(a3+m(a3, a0, a2))+a0(a3+a2),
where m(x, y, z) denotes the negation of m(x, y, z)=xy+xz+yz.
Since
the complexity of this equality is equal to 6 and the depth is equal to 3. Final bounds for the complexity and depth are
L(I(4))≦24,
D(I(4))≦3.
In a given basis
Bα={α, α2, α4, α8}, α+α2+α3+α4=1
the operation of multiplication may be represented by:
Using the brief notation, one may have
(a1b2+a2b1+a0b2+a2b0+a1b3+a3b1+a3b3)=(1,2)+(0,2)+(1,3)+(3)=[1,2]+[0,2]+[1,3]+(0),
(a2b3+a3b2+a1b3+a3b1+a2b0+a0b2+a1b1)=(2,3)+(1,3)+(2,0)+(1)=[2,3]+[1,3]+[2,0]+(0),
(a3b0+a0b3+a2b0+a0b2+a3b1+a1b3+a2b2)=(3,0)+(2,0)+(3,1)+(2)=[3,0]+[2,0]+[3,1]+(1),
(a0b1+a1b0+a3b1+a1b3+a0b2+a2b0+a3b3)==(0,1)+(3,1)+(0,2)+(3)=[0,1]+[3,1]+[0,2]+(2).
The complexity and the depth of multiplication (for odd n) thus have upper bounds
L(M(4n))≦10L(M(n))+21n,
D(M(4n))≦D(M(n))+3.
From foregoing descriptions, it follows that one may construct a multiplication circuit in the field GF(24) with the complexity L(M(4))=31 and the depth D(M(4))=4, and an inversion circuit with the complexity L(M(4))=24 and the depth D(M(4))=3.
Using the foregoing described method of cubic extension, one may thus construct logic circuits for multiplication and inversion in the field GF(212) with the following complexity and depth:
L(M(12))=6M(4)+48=234,
D(M(12)=3+D(M(4))=7,
L(I(12))≦L(I(4))+9L(M(4))+28=331, and
D(I(12))≦D(I(4))+3D(M(4))+1=16.
Let k=5 and n does not divide by 5. One may use in the field GF(25n) a basis
Bαβ={αβ,αβ2, . . . ,αβ2
which is a product of the optimal normal basis of order 5
Bα={α, α2, α4, α8, α16}, α+α2+α4+α5=1,
and any normal (or standard polynomial) basis Bβ.
Any element
x=(x0α+x1α2+x2α4+x3α8+x4α16)εGF(q5),xiεGF(q),q=2n
may be inverted by the equality:
(x0α+x1α2+x2α4+x3α8+x4α8)−1=[σ(x)σ2(x)σ3(x)σ4(x)]/N
where the norm N is equal to the product
N=xσ(x)σ2(x)σ3(x)σ4(x),
where
σ(x)=(x4α+x0α2+x1α4+x2α8+x3α16)
is a shift of vector x, and σk(x)=σ(σk−1(x)) is k-multiple shift (shift on k positions).
Using the equality σ(x)σ(y)=σ(xy), the norm may be an invariant concerning a shift because
Therefore
N=x0α+x1α2+x2α4+x3α8+x4α16=x0=x1=x2=x3=x4,
since
α+α2+α4+α8+α16=1.
N may be computed:
where ⊕ is addition modulo 5.
One may also note that
σ(x)σ2(x)σ3(x)σ4(x)=X0α+X1α2+X2α4+X3α8+X4α16
where all coordinates Xi shift if inputs shift.
In fact,
σ(σ(x)σ2(x)σ3(x)σ4(x))=σ(Nx−1)=Nσ(x)−1=σ(σ(x)σ2(σ(x))σ3(σ(x))σ4(σ(x)).
Therefore for brevity one may compute only the first coordinate in this product
To estimate the complexity of inversion, one may assume for simplicity that in the field GF(2n) a normal basis is chosen.
At first one may compute all cubes xi3 with the complexity of 5L(M(n)) and the depth of D(M(n)), then compute all products xixj with the same depth and the complexity of 10L(M(n)), then compute all sums αi+αj,αi4+αi⊕14,αi2+αi⊕22, with the depth of 1 and the complexity of 20n, and all sums αi3+αi⊕23 with the depth of 1+D(M(n)) and the complexity of 5n.
Then one may compute the formula
with the complexity of 4L(M(n))+6n and the depth of 3+2D(M(n)), using the equality
Next one may compute the formula
with the complexity of 10L(M(n))+14n and the depth of 5+2D(M(n)), and the formula
with the complexity of 10L(M(n))+9n and the depth of 4+2D(M(n)).
Then one may compute the sum of the last formula with the complexity of 10L(M(n))+14n+10L(M(n))+9n and the depth of 6+2D(M(n)).
But the depth may be decreased on 1 without increasing the complexity if one represents this sum as the sum of 10 additive terms, from which only 5 terms have the depth of 2+2D(M(n)) and others have the depth of 1+2D(M(n)), and construct a binary tree from operations of addition so that 5 of its vertex have the depth of 3, and the other 5 vertex have the depth of 4.
Therefore the sum of the foregoing three given formulas has the complexity of 24L(M(n))+29n and the depth of 6+2D(M(n)). One may add a term
with the complexity of 2L(M(n))+n and the depth of 2D(M(n))+1+max{D(M(n)),6}. Therefore the norm N computed may have the complexity of
41L(M(n))+57n
and the depth of
2D(n))+1+max{D(M(n)),6}.
The formula
(Xi⊕22+Xi⊕42)(Xi2+Xi⊕12+Xi⊕32+Xi⊕42)+Xi4+Xi⊕14
computed may have the complexity of 5L(M(n))+10n and the depth of 3+D(M(n)).
The formula
computed may have the complexity of 40L(M(n))+45n and the depth of 4+2D(M(n)).
Therefore the system Xi, i=0, . . . , 4 may have the complexity
45L(M(n))+60n
and the depth
5+2D(M(n)).
The complexity of operator N, Xi is equal to
45(L(M(n))+60n+41L(M(n))+57n=86L(M(n))+117n,
and the depth is equal to 2D(M(n))+1+max {D(M(n)), 6}.
Final estimates for the complexity and depth of inversion are
L(I(5n))≦L(I(n))+91L(M(n))+117n,
D(I(5n))≦D(I(n))+3D(M(n))+1+max {D(M(n)),6}.
In a partial case xi εGF(2), the equality xi2=x1 is valid, and consequently the norm of a nonzero element is equal to 1.
As all coordinates of an element
(x0α+x1α2+x2α4+x3α8+x4α8)−1
shift, if inputs shift, then it may be sufficient to compute only the first coordinate as follows:
where
The depth of this formula is 4, and the complexity is 14. Final estimations for the complexity and depth of inversion are
D(I(5))≦4,
L(I(5))≦55.
Using brief notations, multiplications may be represented by the formula
(a0α+a1α2+a2α4+a3α8+a4α16)(b0α+b1α2+b2α4+b3α8+b4α16)=(c0α+c1α2+c2α4+c3α8+c4α16),
c0=(0,1)+(1,3)+(2,3)+(2,4)+(4),
c1=(1,2)+(2,4)+(3,4)+(3,0)+(0),
c2=(2,3)+(3,0)+(4,0)+(4,1)+(1),
c3=(3,4)+(4,1)+(0,1)+(0,2)+(2),
c4=(4,0)+(0,2)+(1,2)+(1,3)+(3),
where
(i,j)=(xiyj+xjyi), (i)=xiyj
The complexity and the depth of multiplication (n does not divide by 5) may have upper bounds:
L(M(5n))≦15L(M(n))+40n,
D(M(5n))≦D(M(n))+4.
Using extension of 5th degree, one may construct a logic circuit for inversion with the complexity of
L(I(20))≦L(I(4))+91L(M(4))+468=3100+468+24=3313
and the depth of
D(I(20))≦D(I(4))+3D(M(4))+1+max{D(M(4)),6}=22
since L(M(4))=31,D(M(4))=4,L(I(4))=24,D(I(4))=3, as shown in the foregoing description.
Using biquadratic extension one may construct a logic circuit for inversion with the complexity of
L(I(20))≦L(I(5))+30L(M(5))+170=1875
and the depth of
D(I(20))≦D(I(5))+3D(M(5))+4=23.
Both logic circuits use different bases in the field GF(220), but these bases are equivalent: one is permutation of another, and some are a normal base in this field. For any from these bases, the complexity and the depth of multiplication may have upper bounds
L(M(20))≦15L(M(4))+160=625,
D(M(20))≦D(M(4))+4=8.
It is to be noted that the above described embodiments according to the present invention may be conveniently implemented using conventional general purpose digital computers programmed according to the teachings of the present specification, as will be apparent to those skilled in the computer art. Appropriate software coding may readily be prepared by skilled programmers based on the teachings of the present disclosure, as will be apparent to those skilled in the software art.
It is to be understood that the present invention may be conveniently implemented in forms of software package. Such a software package may be a computer program product which employs a storage medium including stored computer code which is used to program a computer to perform the disclosed function and process of the present invention. The storage medium may include, but is not limited to, any type of conventional floppy disks, optical disks, CD-ROMS, magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, or any other suitable media for storing electronic instructions.
It is also understood that the specific order or hierarchy of steps in the methods disclosed are examples of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the method can be rearranged while remaining within the scope of the present invention. The accompanying method claims present elements of the various steps in a sample order, and are not meant to be limited to the specific order or hierarchy presented.
It is believed that the present invention and many of its attendant advantages will be understood by the foregoing description. It is also believed that it will be apparent that various changes may be made in the form, construction and arrangement of the components thereof without departing from the scope and spirit of the invention or without sacrificing all of its material advantages. The form herein before described being merely an explanatory embodiment thereof, it is the intention of the following claims to encompass and include such changes.
Number | Name | Date | Kind |
---|---|---|---|
4989171 | Hollmann | Jan 1991 | A |
5227992 | Lee et al. | Jul 1993 | A |
5396502 | Owsley et al. | Mar 1995 | A |
5467297 | Zook | Nov 1995 | A |
5689452 | Cameron | Nov 1997 | A |
5982895 | Dworkin et al. | Nov 1999 | A |
6052704 | Wei | Apr 2000 | A |
6141786 | Cox et al. | Oct 2000 | A |
6199087 | Blake et al. | Mar 2001 | B1 |
6202076 | Aoki et al. | Mar 2001 | B1 |
6266688 | Aoki et al. | Jul 2001 | B1 |
Number | Date | Country | |
---|---|---|---|
20040225701 A1 | Nov 2004 | US |