Journal of Cryptographic Engineering
, Volume 5, Issue 1, pp 31-52
First online:
Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV–GLS curves (extended version)
- Armando Faz-HernándezAffiliated withInstitute of Computing, University of Campinas
- , Patrick LongaAffiliated withMicrosoft Research, One Microsoft Way Email author
- , Ana H. SánchezAffiliated withDigital Security Group, Radboud University Nijmegen
Rent the article at a discount
Rent now* Final gross prices may vary according to local VAT.
Get AccessAbstract
We propose efficient algorithms and formulas that improve the performance of side channel protected elliptic curve computations with special focus on scalar multiplication exploiting the Gallant–Lambert–Vanstone (CRYPTO 2001) and Galbraith–Lin–Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.’s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar multiplication that offer protection against simple side-channel and timing attacks. Secondly, we propose an efficient, side-channel protected algorithm for fixed-base scalar multiplication which combines Feng et al.’s recoding with Lim-Lee’s comb method. Thirdly, we propose an efficient technique that interleaves ARM and NEON-based multiprecision operations over an extension field to improve performance of GLS curves on modern ARM processors. Finally, we showcase the efficiency of the proposed techniques by implementing a state-of-the-art GLV–GLS curve in twisted Edwards form defined over \(\mathbb {F}_{p^2}\), which supports a four-dimensional decomposition of the scalar and is fully protected against timing attacks. Analysis and performance results are reported for modern \(\times \)64 and ARM processors. For instance, we compute a variable-base scalar multiplication in 89,000 and 244,000 cycles on an Intel Ivy Bridge and an ARM Cortex-A15 processor (respect.); using a precomputed table of 6KB, we compute a fixed-base scalar multiplication in 49,000 and 116,000 cycles (respect.); and using a precomputed table of 3KB, we compute a double-scalar multiplication in 115,000 and 285,000 cycles (respect.). The proposed techniques represent an important improvement of the state-of-the-art performance of elliptic curve computations, and allow us to set new speed records in several modern processors. The techniques also reduce the cost of adding protection against timing attacks in the computation of GLV-based variable-base scalar multiplication to below 10 %. This work is the extended version of a publication that appeared at CT-RSA (Faz-Hernández et al. Topics in Cryptology, CT-RSA 2014, vol. 8366, pp. 1–27 2014).
Keywords
Elliptic curves Scalar multiplication Side-channel protection GLV method GLS method GLV–GLS curve \(\times \)64 processor ARM processor NEON vector unit- Title
- Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV–GLS curves (extended version)
- Journal
-
Journal of Cryptographic Engineering
Volume 5, Issue 1 , pp 31-52
- Cover Date
- 2015-04
- DOI
- 10.1007/s13389-014-0085-7
- Print ISSN
- 2190-8508
- Online ISSN
- 2190-8516
- Publisher
- Springer Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- Elliptic curves
- Scalar multiplication
- Side-channel protection
- GLV method
- GLS method
- GLV–GLS curve
- $$\times $$ × 64 processor
- ARM processor
- NEON vector unit
- Industry Sectors
- Authors
-
-
Armando Faz-Hernández
(1)
-
Patrick Longa
(2)
-
Ana H. Sánchez
(3)
-
Armando Faz-Hernández
- Author Affiliations
-
- 1. Institute of Computing, University of Campinas, Campinas, Brazil
- 2. Microsoft Research, One Microsoft Way, Redmond, WA, 98052, USA
- 3. Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands
-