Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction

被引:30
|
作者
Taverne, Jonathan [1 ]
Faz-Hernandez, Armando [2 ]
Aranha, Diego F. [3 ]
Rodriguez-Henriquez, Francisco [2 ]
Hankerson, Darrel [4 ]
Lopez, Julio [3 ]
机构
[1] Univ Lyon, Univ Lyon 1, ISFA, Lyon, France
[2] CINVESTAV IPN, Dept Comp Sci, Mexico City, DF, Mexico
[3] Univ Estadual Campinas, Inst Comp, Campinas, SP, Brazil
[4] Auburn Univ, Auburn, AL 36849 USA
基金
巴西圣保罗研究基金会;
关键词
Elliptic curve cryptography; Finite field arithmetic; Parallel algorithm; Efficient software implementation;
D O I
10.1007/s13389-011-0017-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The availability of a newcarry-lessmultiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for reevaluating algorithms for binary field arithmetic and scalar multiplication over elliptic curves. We describe how to best employ this instruction in field multiplication and the effect on performance of doubling and halving operations. Alternate strategies for implementing inversion and half-trace are examined to restore most of their competitiveness relative to the new multiplier. These improvements in field arithmetic are complemented by a study on serial and parallel approaches for Koblitz and random curves, where parallelization strategies are implemented and compared. The contributions are illustrated with experimental results improving the state-of-the-art performance of halving and doubling-based scalar multiplication on NIST curves at the 112-and 192-bit security levels and a newspeed record for side-channel-resistant scalar multiplication in a random curve at the 128-bit security level. The algorithms presented in this work were implemented on Westmere and Sandy Bridge processors, the latest generation Intel microarchitectures.
引用
收藏
页码:187 / 199
页数:13
相关论文
共 50 条
  • [31] Elliptic scalar multiplication using point halving
    Knudsen, EW
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 135 - 149
  • [32] Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRM
    Anagreh, Mohammad
    Vainikko, Eero
    Laud, Peeter
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 176 - 184
  • [33] Speeding up scalar multiplication in genus 2 hyperelliptic curves with efficient endomorphisms
    Park, TJ
    Lee, MK
    Park, K
    Chung, KI
    ETRI JOURNAL, 2005, 27 (05) : 617 - 627
  • [34] Distributed solution of scalar multiplication on elliptic curves over Fp for resource-constrained networks
    Ramdani, Mohamed
    Benmohammed, Mohamed
    Benblidia, Nadjia
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [35] d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves
    Hisil, Huseyin
    Hutchinson, Aaron
    Karabina, Koray
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 198 - 217
  • [36] Speeding up the Elliptic Curve Scalar Multiplication Using the Window- w Non Adjacent Form
    Al Saffar, Najlae Falah Hameed
    Said, Mohamad Rushdan Md
    MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES, 2015, 9 (01): : 91 - 110
  • [37] Efficient scalar multiplication in hyperelliptic curves using a new Frobenius expansion
    Park, TJ
    Lee, MK
    Park, K
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 152 - 165
  • [38] Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians
    Smith, Benjamin
    ALGORITHMIC ARITHMETIC, GEOMETRY, AND CODING THEORY, 2015, 637 : 127 - 141
  • [39] A Heuristic Method of Scalar Multiplication of Elliptic Curve over OEF
    刘铎
    罗平
    戴一奇
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 177 - 183
  • [40] Multiple scalar-multiplication algorithm over elliptic curve
    Kobayashi, K
    Morita, H
    Hakuta, M
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (02) : 271 - 276