On Software Implementation of Arithmetic Operations on Prime Fields using AVX2
Resumo
AVX2 is the newest instruction set on Intel Haswell processor that provides simultaneous execution of operations over vectors of data. This work presents the advances on the applicability of AVX2 on the development of prime field arithmetic, which is a building block for the construction of Elliptic Curve Cryptosystems. Having as a goal the efficient and secure implementation of prime field arithmetic, we show some advantages that vector instructions offer compared against 64-bit implementations. In order to validate the results of our research, we present a benchmark obtained on a Haswell processor.Referências
Aranha, D. F., Barreto, P. S. L. M., Pereira, G. C. C. F., and Ricardini, J. E. (2013).
A note on high-security general-purpose elliptic curves. Cryptology ePrint Archive, Report 2013/647. http://eprint.iacr.org/.
Bernstein, D. and Schwabe, P. (2012). NEON Crypto. In Prouff, E. and Schaumont, P., editors, Cryptographic Hardware and Embedded Systems – CHES 2012, volume 7428 of Lecture Notes in Computer Science, pages 320–339. Springer Berlin Heidelberg.
Bernstein, D. J. (2006). Curve25519: New Diffie-Hellman Speed Records. In Yung, M., Dodis, Y., Kiayias, A., and Malkin, T., editors, Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, pages 207–228. Springer.
Bos, J. W., Costello, C., Longa, P., and Naehrig, M. (2014). Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. Cryptology ePrint Archive, Report 2014/130. http://eprint.iacr.org/.
Gallagher, P., Foreword, D. D., and Director, C. F. (2009). FIPS PUB 186-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS).
A note on high-security general-purpose elliptic curves. Cryptology ePrint Archive, Report 2013/647. http://eprint.iacr.org/.
Bernstein, D. and Schwabe, P. (2012). NEON Crypto. In Prouff, E. and Schaumont, P., editors, Cryptographic Hardware and Embedded Systems – CHES 2012, volume 7428 of Lecture Notes in Computer Science, pages 320–339. Springer Berlin Heidelberg.
Bernstein, D. J. (2006). Curve25519: New Diffie-Hellman Speed Records. In Yung, M., Dodis, Y., Kiayias, A., and Malkin, T., editors, Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, pages 207–228. Springer.
Bos, J. W., Costello, C., Longa, P., and Naehrig, M. (2014). Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. Cryptology ePrint Archive, Report 2014/130. http://eprint.iacr.org/.
Gallagher, P., Foreword, D. D., and Director, C. F. (2009). FIPS PUB 186-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Digital Signature Standard (DSS).
Publicado
03/11/2014
Como Citar
FAZ-HERNÁNDEZ, Armando; LÓPEZ, Julio.
On Software Implementation of Arithmetic Operations on Prime Fields using AVX2. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 14. , 2014, Belo Horizonte.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2014
.
p. 338-341.
DOI: https://doi.org/10.5753/sbseg.2014.20148.