On 03/19/2015 10:03 AM, Michael Scott wrote:

Its nice to find a new Elliptic curve that bucks the complexity curve. Nothing nicer than more security for less cost.

So introducing the Edwards curve E-3363

x^2+y^2=1+11111.x^2.y^2 mod 2^336-3

The modulus works particularly well with the Granger-Scott approach to modular multiplication. Observe that 336=56*6=28*12. The order is 8 times a prime, the twist is 4 times a prime. 11111 is the smallest positive value to yield a twist secure curve with cofactors less than or equal to 8. Not only is it “rigid”, it even looks rigid!


Great, that looks like a very implementation-friendly prime.

This is merely billions of times more secure than the already secure Curve25519. It fills a gap in terms of existing proposals, coming as it does between WF-128 and WF-192. My implementation takes 333,000 cycles on a 64-bit Intel Haswell for a variable point multiplication, but it is also 32-bit-friendly. The modulus is 5 mod 8, but with Curve25519 we have gotten over that already.


Is this the Montgomery ladder, or a (twisted) Edwards implementation? Just curious. The timing is very good. It hits the "Curve25519 plus roughly Karatsuba scaling" efficiency curve, and it ought to do at least as well on ARM NEON with your 28x12 layout.

Note that with this curve we follow others in moving away from the artificial constraint imposed by the desire to use a fully saturated representation, whereby the modulus should be an exact multiple of the word-length, and the associated idea of using a Solinas prime. In my view this approach is (a) not necessarily optimal, (b) encourages non-portable implementation, and (c) is harder to make side-channel secure.

At the very least Curve E-3363 provides a useful data-point on the security-cost curve.

Mike

Yeah, Crandall primes are definitely a better choice than Solinas primes in most cases. Especially when they end up with a coefficient that's both small and aligned.

Thanks for this,
-- another Mike
_______________________________________________
Curves mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/curves

Reply via email to