Non-adjacent form

The non-adjacent form (NAF) of a number is a unique signed-digit representation. Like the name suggests, non-zero values cannot be adjacent. For example:

(0 1 1 1)2 = 4 + 2 + 1 = 7
(1 0 −1 1)2 = 8 − 2 + 1 = 7
(1 −1 1 1)2 = 8 − 4 + 2 + 1 = 7
(1 0 0 −1)2 = 8 − 1 = 7

All are valid signed-digit representations of 7, but only the final representation, (1 0 0 −1)2, is in NAF.

Properties

NAF assures a unique representation of an integer, but the main benefit of it is that the Hamming weight of the value will be minimal. For regular binary representations of values, half of all bits will be non-zero, on average, but with NAF this drops to only one-third of all digits.

Obviously, at most half of the digits are non-zero, which was the reason it was introduced by G.W. Reitweisner [1] for speeding up early multiplication algorithms, much like Booth encoding.

Because every non-zero digit has to be adjacent to two 0s, the NAF representation can be implemented such that it only takes a maximum of m + 1 bits for a value that would normally be represented in binary with m bits.

The properties of NAF make it useful in various algorithms, especially some in cryptography; e.g., for reducing the number of multiplications needed for performing an exponentiation. In the algorithm, exponentiation by squaring, the number of multiplications depends on the number of non-zero bits. If the exponent here is given in NAF form, a digit value 1 implies a multiplication by the base, and a digit value −1 by its reciprocal.

Other ways of encoding integers that avoid consecutive 1s include Booth encoding and Fibonacci coding.

Converting to NAF

There are several algorithms for obtaining the NAF representation of a value given in binary. One such is the following method using repeated division; it works by choosing non-zero coefficients such that the resulting quotient is divisible by 2 and hence the next coefficient a zero.[2]

   Input     E = (em  1 em  2 ··· e1 e0)2
   Output     Z = (zm zm  1 ··· z1 z0)NAF
   i ← 0
   while E > 0 do
       if E is odd then
           zi ← 2  (E mod 4)
           EE  zi
       else
           zi ← 0
       EE/2
       ii + 1
   return z
gollark: Not cognitohazards.
gollark: > honestly my theory that libright is actually authright in disguise is probably true...
gollark: My thinking on social policy and whatnot doesn't run entirely utilitarian-ly, but I think if you go around giving organizations power to censor and manage speech a lot it is much easier for them to slide into authoritarianism.
gollark: Ridiculing people is cool and good™, censoring them isn't.
gollark: Power concentrated like that is *inherently* pretty bad because it could be misused at some point.

References

  1. George W. Reitwiesner, Binary Arithmetic, Advances in Computers, 1960.
  2. D. Hankerson, A. Menezes, and S.A. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag, 2004. p. 98.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.