Skip to main content

Itoh–Tsujii Inversion Algorithm

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 406 Accesses

Work done while the author was at Philips Research, The Netherlands

Definition

Originally introduced in [5], the Itoh and Tsujii algorithm (ITA) is an exponentiation-based algorithm for inversion in finite fields which reduces the complexity of computing the inverse of a nonzero element in \({\mathbb{F}}_{{2}^{n}}\), when using a normal basis representation, from n − 2 multiplications in \({\mathbb{F}}_{{2}^{n}}\) and n − 1 cyclic shifts using the binary exponentiation method to at most \(2{\lfloor \log }_{2}(n - 1)\rfloor \) multiplications in \({\mathbb{F}}_{{2}^{n}}\) and n − 1 cyclic shifts. As shown in [4], the method is also applicable to finite fields with a polynomial basis representation.

Related Concepts

It is a well-known fact that there are several possibilities to represent elements of a finite field. In particular, given an irreducible polynomial P(x) of degree m over \({\mathbb{F}}_{q}\) and a root \(\alpha \) of P(x) (i.e., \(P(\alpha ) = 0\)), one can represent an...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Bailey DV, Paar C (2001) Efficient arithmetic in finite field extensions with application in elliptic curve cryptography. J Cryptol 14(3):153–176

    MATH  MathSciNet  Google Scholar 

  2. Chung JW, Sim SG, Lee PJ (2000) Fast implementation of elliptic curve defined over \({\it { GF}}({p}^{m})\) on CalmRISC with MAC2424 coprocessor. In: Koç ÇK, Paar C (eds) Workshop on cryptographic hardware and embedded systems – CHES 2000. Lecture notes in computer science, vol 1965. Springer, Berlin, 17–18 Aug 2000, pp 57–70

    Google Scholar 

  3. Guajardo J, Paar C (1997) Efficient algorithms for elliptic curve cryptosystems. In: Kaliski Jr B (ed) Advances in Cryptology – CRYPTO ’97. Lecture notes in computer science, vol 1294. Springer, Berlin, Aug 1997, pp 342–356

    Google Scholar 

  4. Guajardo J, Paar C (Feb 2002) Itoh-Tsujii inversion in standard basis and its application in cryptography and codes. Des Codes Cryptogr 25(2):207–216

    MATH  MathSciNet  Google Scholar 

  5. Itoh T, Tsujii S (1988) A fast algorithm for computing multiplicative inverses in \({\it { GF}}({2}^{m})\) using normal bases. Inf Comput 78:171–177

    MATH  MathSciNet  Google Scholar 

  6. Lidl R, Niederreiter H (1997) Finite fields. Encyclopedia of mathematics and its applications, 2nd edn. vol 20. Cambridge University Press, Cambridge

    Google Scholar 

  7. Rodríguez-Henríquez F, Morales-Luna G, Saqib NA, Cortés NC (2007) Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials. Des Codes Cryptogr 45(1):19–37

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorge Guajardo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Guajardo, J. (2011). Itoh–Tsujii Inversion Algorithm. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_34

Download citation

Publish with us

Policies and ethics