首页> 外文期刊>Journal of cryptographic engineering >Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version)
【24h】

Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version)

机译:基于GLV的标量乘法的高效且安全的算法及其在GLV-GLS曲线上的实现(扩展版)

获取原文
获取原文并翻译 | 示例
           

摘要

We propose efficient algorithms and formulas that improve the performance of side channel protected elliptic curve computations with special focus on scalar multiplication exploiting the Gallant-Lambert-Vanstone (CRYPTO 2001) and Galbraith-Lin-Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.'s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar multiplication that offer protection against simple side-channel and timing attacks. Secondly, we propose an efficient, side-channel protected algorithm for fixed-base scalar multiplication which combines Feng et al.'s recoding with Lim-Lee's comb method. Thirdly, we propose an efficient technique that interleaves ARM and NEON-based multiprecision operations over an extension field to improve performance of GLS curves on modern ARM processors. Finally, we showcase the efficiency of the proposed techniques by implementing a state-of-the-art GLV-GLS curve in twisted Edwards form defined over F_(p~2), which supports a four-dimensional decomposition of the scalar and is fully protected against timing attacks. Analysis and performance results are reported for modern ×64 and ARM processors. For instance, we compute a variable-base scalar multiplication in 89,000 and 244,000 cycles on an Intel Ivy Bridge and an ARM Cortex-A15 processor (respect.); using a precom-puted table of 6KB, we compute a fixed-base scalar multiplication in 49,000 and 116,000 cycles (respect.); and using a precomputed table of 3KB, we compute a double-scalar multiplication in 115,000 and 285,000 cycles (respect.). The proposed techniques represent an important improvement of the state-of-the-art performance of elliptic curve computations, and allow us to set new speed records in several modern processors. The techniques also reduce the cost of adding protection against timing attacks in the computation of GLV-based variable-base scalar multiplication to below 10 %. This work is the extended version of a publication that appeared at CT-RSA (Faz-Hernandez et al. Topics in Cryptology, CT-RSA 2014, vol. 8366, pp. 1-27 2014).
机译:我们提出了一种有效的算法和公式,可以通过利用Gallant-Lambert-Vanstone(CRYPTO 2001)和Galbraith-Lin-Scott(EUROCRYPT 2009)方法来特别关注标量乘法来改善侧通道保护的椭圆曲线计算的性能。首先,通过使Feng等人的编码适应GLV设置,我们得出了用于可变基标量乘法的新常规算法,该算法可提供针对简单边信道和定时攻击的保护。其次,我们提出了一种有效的,用于固定基标量乘法的侧信道保护算法,该算法将Feng等人的重新编码与Lim-Lee的梳理方法相结合。第三,我们提出了一种有效的技术,该技术可在扩展字段上交错使用基于ARM和NEON的多精度操作,以提高现代ARM处理器上GLS曲线的性能。最后,我们通过在F_(p〜2)上定义的扭曲Edwards形式实现最新的GLV-GLS曲线,展示了所提出技术的效率,该曲线支持标量的四维分解并且完全保护免受定时攻击。报告了针对现代×64和ARM处理器的分析和性能结果。例如,我们在Intel Ivy Bridge和ARM Cortex-A15处理器上(分别)在89,000和244,000个周期中计算了基于变量的标量乘法。使用6KB的预先计算的表,我们计算了49,000和116,000个周期(分别为)的固定基数标量乘法。并使用3KB的预先计算表,我们计算了115,000和285,000个周期(相对)中的双标量乘法。所提出的技术代表了椭圆曲线计算的最新性能的重要改进,并允许我们在多个现代处理器中设置新的速度记录。该技术还将基于GLV的可变基标量乘法的计算中增加的针对定时攻击的保护成本降低到10%以下。这项工作是出现在CT-RSA上的出版物的扩展版本(Faz-Hernandez等人,“密码学主题”,CT-RSA 2014,第8366卷,第1-27页,2014年)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号