Re: [Cfrg] Elliptic Curves - poll on specific curve around 256bit work factor (ends on February 23rd)

Mike Hamburg <mike@shiftleft.org> Thu, 19 February 2015 17:22 UTC

Return-Path: <mike@shiftleft.org>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDD7B1A039C for <cfrg@ietfa.amsl.com>; Thu, 19 Feb 2015 09:22:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.555
X-Spam-Level: *
X-Spam-Status: No, score=1.555 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, HELO_MISMATCH_ORG=0.611, HOST_MISMATCH_NET=0.311, RDNS_DYNAMIC=0.982, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zK1S92_LQSqz for <cfrg@ietfa.amsl.com>; Thu, 19 Feb 2015 09:22:29 -0800 (PST)
Received: from aspartame.shiftleft.org (199-116-74-168-v301.PUBLIC.monkeybrains.net [199.116.74.168]) (using TLSv1.1 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80A011A1A69 for <cfrg@irtf.org>; Thu, 19 Feb 2015 09:22:28 -0800 (PST)
Received: from [192.168.1.102] (unknown [192.168.1.1]) by aspartame.shiftleft.org (Postfix) with ESMTPSA id 32217F210A; Thu, 19 Feb 2015 09:20:58 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=shiftleft.org; s=sldo; t=1424366458; bh=8+iVxpkssspaJqk2CqPP3el3/rc6RFJPx5N/0abZK9w=; h=Date:From:To:Subject:References:In-Reply-To:From; b=hD+BJRZ2eIr2o/TRLZL27m/gJDyFwxorGnBjEPw/xCPdu/DWCaLzJFj9NS5hN3G/N OGXzpdtmUYh1mOU0FAlbsyfpwqKMHWjDseAzUhq7PZMiphWUTCJOn7GEETQNWYwug8 ZIwGnrC2mdw9vQS/rdkoSklHL7FVYQr40j5ZL9t0=
Message-ID: <54E61BD2.8050705@shiftleft.org>
Date: Thu, 19 Feb 2015 09:22:26 -0800
From: Mike Hamburg <mike@shiftleft.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Jon Callas <jon@callas.org>, "cfrg@irtf.org" <cfrg@irtf.org>
References: <54E46EA4.9010002@isode.com> <m3sie2bvjh.fsf@carbon.jhcloos.org> <E6CF50E9-EB1E-4102-A1C8-7CEE62A577EB@callas.org>
In-Reply-To: <E6CF50E9-EB1E-4102-A1C8-7CEE62A577EB@callas.org>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/cfrg/UqFd0IDq3m4RtizaN-bAx98cPTE>
Subject: Re: [Cfrg] Elliptic Curves - poll on specific curve around 256bit work factor (ends on February 23rd)
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Feb 2015 17:22:30 -0000

Jon, if you're using Curve41417, do you have benchmarks for Curve41417 
on x86 or amd64?  I've only ever seen their NEON benchmarks.

-- Mike

On 02/19/2015 08:07 AM, Jon Callas wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> I'm using Curve 41417 because it was designed for more-than 128 bits of strength, and has really good performance.
>
> There was a paper at CHES last summer, "Curve41417: Karatsuba revisited"
>
> http://eprint.iacr.org/2014/526.pdf
>
> The implementation they did on ARM with NEON is faster than the OpenSSL implementation of P-160, and runs at around 12% (yes, about eight times faster) of the speed of P-384.
>
> For me, it really hits the sweet spot. It's fast enough that I don't worry and secure enough that I don't worry.
>
> 	Jon
>
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGP Universal 3.3.0 (Build 9060)
> Charset: us-ascii
>
> wsBVAwUBVOYKUvD9H+HfsTZWAQjykwf/fNoWAg7Z00EJSRRoAptN8uKIOpibL/5i
> NaxWIeLDqnB25K1H5MVQ9I93vIZdW+MlUu4L9cASmCmIWTv0HTyA3ps1/rfH/wh2
> oGHzfAzdRugSMJLL0MAj2AzQX4Qi4ax6/jRz6UdlYm5y0AeHr8sQhQyrkzQgNUCe
> AilGvr5thli2pRfS+bGL/FpwZ/MlG7cuo91O7M25JaKZwJj2DAoDgvZgAuHmPPZO
> HkyfNBGQ/BenywYsW9y6j0f998983IMOICyeuk2/8SIloae9bsdjRCKiFnK/mMpl
> aj+0i94uwk/GdYcIz5mlRChzamBySEuAP8pf4Kh4GXZiTzMBRjl5BQ==
> =Lf3T
> -----END PGP SIGNATURE-----
>
> _______________________________________________
> Cfrg mailing list
> Cfrg@irtf.org
> http://www.irtf.org/mailman/listinfo/cfrg