High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions

被引:25
|
作者
Faz-Hernandez, Armando [1 ]
Lopez, Julio [1 ]
Dahab, Ricardo [1 ]
机构
[1] Univ Estadual Campinas, Inst Comp, 1251 Albert Einstein,Cidade Univ, BR-13083852 Campinas, SP, Brazil
来源
基金
巴西圣保罗研究基金会;
关键词
Edwards digital signature algorithm; Diffie-Hellman protocol; Ed25519; AVX2 vector instructions; elliptic curve cryptography; secure software; ALGORITHMS; EFFICIENT;
D O I
10.1145/3309759
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used to implement cryptosystems. In particular, the elliptic curves Curve25519 and Curve448 were used for instantiating Diffie-Hellman protocols named X25519 and X448. Mapping these curves to twisted Edwards curves allowed deriving two new signature instances, called Ed25519 and Ed448, of the Edwards Digital Signature Algorithm. In this work, we focus on the secure and efficient software implementation of these algorithms using SIMD parallel processing. We present software techniques that target the Intel AVX2 vector instruction set for accelerating prime field arithmetic and elliptic curve operations. Our contributions result in a high-performance software library for AVX2-ready processors. For example, our library computes digital signatures 19% (for Ed25519) and 29% (for Ed448) faster than previous optimized implementations. Also, our library improves by 10% and 20% the execution time of X25519 and X448, respectively.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions
    Cheng, Hao
    Grossschaedl, Johann
    Tian, Jiaqi
    Ronne, Peter B.
    Ryan, Peter Y. A.
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 698 - 719
  • [2] High-Performance Hardware Implementation of Elliptic Curve Cryptography Point Multiplication over GF(p)
    Gao W.
    Luo Y.
    Li J.
    Wu H.
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2021, 41 (09): : 977 - 984
  • [3] Implementation and Performance Analysis of Elliptic Curve Cryptography using an Efficient Multiplier
    Renita, J.
    Elizabeth, Edna N.
    Asokan, Nandhini
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2022, 22 (02) : 53 - 60
  • [4] Elliptic Curve Cryptography hardware accelerator for high-performance secure servers
    Luis Parrilla
    José A. Álvarez-Bermejo
    Encarnación Castillo
    Juan A. López-Ramos
    Diego P. Morales-Santos
    Antonio García
    The Journal of Supercomputing, 2019, 75 : 1107 - 1122
  • [5] Elliptic Curve Cryptography hardware accelerator for high-performance secure servers
    Parrilla, Luis
    Alvarez-Bermejo, Jose A.
    Castillo, Encarnacion
    Lopez-Ramos, Juan A.
    Morales-Santos, Diego P.
    Garcia, Antonio
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (03): : 1107 - 1122
  • [6] High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n)
    Harb, Salah
    Ahmad, M. Omair
    Swamy, M. N. S.
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 15 - 24
  • [7] High-Performance FPGA Implementation of Modular Inversion over F256 for Elliptic Curve Cryptography
    Hossain, Md Selim
    Kong, Yinan
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 169 - 174
  • [8] High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Liu, Shuai
    Ju, Lei
    Cai, Xiaojun
    Jia, Zhiping
    Zhang, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 148 - 155
  • [9] Implementation of Text Encryption using Elliptic Curve Cryptography
    Singh, Laiphrakpam Dolendro
    Singh, Khumanthem Manglem
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 73 - 82
  • [10] High-performance elliptic curve cryptography processor over NIST prime fields
    Hossain, Md Selim
    Kong, Yinan
    Saeedi, Ehsan
    Vayalil, Niras C.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (01): : 33 - 42