Faster Binary-Field Multiplication and Faster Binary-Field MACs
نویسندگان
چکیده
This paper shows how to securely authenticate messages using just 29 bit operations per authenticated bit, plus a constant overhead per message. The authenticator is a standard type of “universal” hash function providing information-theoretic security; what is new is computing this type of hash function at very high speed. At a lower level, this paper shows how to multiply two elements of a field of size 2 using just 9062 ≈ 71 · 128 bit operations, and how to multiply two elements of a field of size 2 using just 22164 ≈ 87 · 256 bit operations. This performance relies on a new representation of field elements and new FFT-based multiplication techniques. This paper’s constant-time software uses just 1.89 Core 2 cycles per byte to authenticate very long messages. On a Sandy Bridge it takes 1.43 cycles per byte, without using Intel’s PCLMULQDQ polynomialmultiplication hardware. This is much faster than the speed records for constant-time implementations of GHASH without PCLMULQDQ (over 10 cycles/byte), even faster than Intel’s best Sandy Bridge implementation of GHASH with PCLMULQDQ (1.79 cycles/byte), and almost as fast as state-of-the-art 128-bit prime-field MACs using Intel’s integermultiplication hardware (around 1 cycle/byte).
منابع مشابه
Binary field multiplication on ARMv8
In this paper, we show efficient implementations of binary field multiplication over ARMv8. We exploit an advanced 64-bit polynomial multiplication (PMULL) supported by ARMv8 and conduct multiple levels of asymptotically faster Karatsuba multiplication. Finally, our method conducts binary field multiplication within 57 clock cycles for B-251. Our proposed method on ARMv8 improves the performanc...
متن کاملImplementing GCM on ARMv8
The Galois/Counter Mode is an authenticated encryption scheme which is included in protocols such as TLS and IPSec. Its implementation requires multiplication over a binary finite field, an operation which is costly to implement in software. Recent processors have included instructions aimed to speed up binary polynomial multiplication, an operation which can be used to implement binary field m...
متن کاملFast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
Efficient algorithms for binary field operations are required in several cryptographic operations such as digital signatures over binary elliptic curves and encryption. The main performance-critical operation in these fields is the multiplication, since most processors do not support instructions to carry out a polynomial multiplication. In this paper we describe a novel software multiplier for...
متن کاملEfficient Implementation of Arithmetic Operations in ECC over Binary Fields
In this paper the implementation of arithmetic operations in ECC is described.Elliptic curve cryptography is very useful in the field of the network security because of its small key size and its high strength of security.In this paper briefly describing general arithmetic operations we focus on scalar multiplication . We present two techniques: (i)reducing Hamming weight of scalars in binary r...
متن کاملA Unified Approach to MPC with Preprocessing Using OT
SPDZ, TinyOT and MiniMAC are a family of MPC protocols based on secret sharing with MACs, where a preprocessing stage produces multiplication triples in a finite field. This work describes new protocols for generating multiplication triples in fields of characteristic two using OT extensions. Before this work, TinyOT, which works on binary circuits, was the only protocol in this family using OT...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014