Time-Efficient Finite Field Microarchitecture Design for Curve448 and Ed448 on Cortex-M4

被引:25
作者
Anastasova, Mila [1 ]
Azarderakhsh, Reza [1 ]
Kermani, Mehran Mozaffari [2 ]
Beshaj, Lubjana [3 ]
机构
[1] Florida Atlantic Univ, Comp & Elect Engn & Comp Sci Dept, I SENSE, Boca Raton, FL USA
[2] Univ S Florida, Comp Engn & Sci Dept, Tampa, FL USA
[3] US Mil Acad West Point, West Point, NY USA
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022 | 2023年 / 13849卷
基金
芬兰科学院;
关键词
Elliptic Curve Cryptography; Curve448; Elliptic Curve Diffie-Hellman (ECDH); Edwards-Curve Digital Signature Algorithm (EdDSA); Cortex-M4; CURVE25519; 8-BIT;
D O I
10.1007/978-3-031-29371-9_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The elliptic curve family of schemes has the lowest computational latency, memory use, energy consumption, and bandwidth requirements, making it the most preferred public key method for adoption into network protocols. Being suitable for embedded devices and applicable for key exchange and authentication, ECC is assuming a prominent position in the field of IoT cryptography. The attractive properties of the relatively new curve Curve448 contribute to its inclusion in the TLS1.3 protocol and pique the interest of academics and engineers aiming at studying and optimizing the schemes. When addressing low-end IoT devices, however, the literature indicates little work on these curves. In this paper, we present an efficient design for both protocols based on Montgomery curve Curve448 and its birationally equivalent Edwards curve Ed448 used for key agreement and digital signature algorithm, specifically the X448 function and the Ed448 DSA, relying on efficient low-level arithmetic operations targeting the ARM-based Cortex-M4 platform. Our design performs point multiplication, the base of the Elliptic Curve Diffie-Hellman (ECDH), in 3,2KCCs, resulting in more than 48% improvement compared to the best previous work based on Curve448, and performs sign and verify, the main operations of the Edwards-curves Digital Signature Algorithm (EdDSA), in 6,038KCCs and 7,404KCCs, showing a speedup of around 11% compared to the counterparts. We present novel modular multiplication and squaring architectures reaching similar to 25% and similar to 35% faster runtime than the previous best-reported results, respectively, based on Curve448 key exchange counterparts, and similar to 13% and similar to 25% better latency results than the Ed448-based digital signature counterparts targeting Cortex-M4 platform.
引用
收藏
页码:292 / 314
页数:23
相关论文
共 35 条
  • [1] Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4
    Anastasova, Mila
    Bisheh-Niasar, Mojtaba
    Seo, Hwajeong
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2022, : 93 - 96
  • [2] Compressed SIKE Round 3 on ARM Cortex-M4
    Anastasova, Mila
    Bisheh-Niasar, Mojtaba
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 : 441 - 457
  • [3] Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4
    Anastasova, Mila
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 68 (10) : 4129 - 4141
  • [4] ARM, CORT M4 ISA
  • [5] Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
  • [6] Bernstein DJ, 2011, LECT NOTES COMPUT SC, V6917, P124, DOI 10.1007/978-3-642-23951-9_9
  • [7] Bernstein Daniel J., 2013, Security dangers of the NIST curves
  • [8] Cryptographic Accelerators for Digital Signature Based on Ed25519
    Bisheh-Niasar, Mojtaba
    Azarderakhsh, Reza
    Mozaffari-Kermani, Mehran
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (07) : 1297 - 1305
  • [9] De Santis F., 2016, Proceedings of Software performance enhancement for encryption and decryption, and benchmarking, P19
  • [10] High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
    Duell, Michael
    Haase, Bjoern
    Hinterwaelder, Gesine
    Hutter, Michael
    Paar, Christof
    Sanchez, Ana Helena
    Schwabe, Peter
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 493 - 514