Cryptology ePrint Archive: Report 2015/036

Faster software for fast endomorphisms

Billy Bob Brumley

Abstract: GLV curves (Gallant et al.) have performance advantages over standard elliptic curves, using half the number of point doublings for scalar multiplication. Despite their introduction in 2001, implementations of the GLV method have yet to permeate widespread software libraries. Furthermore, side-channel vulnerabilities, specifically cache-timing attacks, remain unpatched in the OpenSSL code base since the first attack in 2009 (Brumley and Hakala) even still after the most recent attack in 2014 (Benger et al.). This work reports on the integration of the GLV method in OpenSSL for curves from 160 to 256 bits, as well as deploying and evaluating two side-channel defenses. Performance gains are up to 51%, and with these improvements GLV curves are now the fastest elliptic curves in OpenSSL for these bit sizes.

Category / Keywords: implementation / elliptic curve cryptography, GLV curves, side-channel analysis, timing attacks, cache-timing attacks, OpenSSL

Date: received 15 Jan 2015

Contact author: billy brumley at tut fi

Available format(s): PDF | BibTeX Citation

Version: 20150115:182300 (All versions of this report)

Short URL: ia.cr/2015/036

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]