Re: [Cfrg] On relative performance of Edwards v.s. Montgomery Curve25519, variable base

Kurt Roeckx <kurt@roeckx.be> Mon, 12 January 2015 21:46 UTC

Return-Path: <kurt@roeckx.be>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B94551A6FD5 for <cfrg@ietfa.amsl.com>; Mon, 12 Jan 2015 13:46:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MSZXqpiyPJf4 for <cfrg@ietfa.amsl.com>; Mon, 12 Jan 2015 13:46:46 -0800 (PST)
Received: from defiant.e-webshops.eu (defiant.e-webshops.eu [82.146.122.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69F221A6F0A for <cfrg@irtf.org>; Mon, 12 Jan 2015 13:46:46 -0800 (PST)
Received: from intrepid.roeckx.be (localhost [127.0.0.1]) by defiant.e-webshops.eu (Postfix) with ESMTP id 01DF71C2149; Mon, 12 Jan 2015 22:46:44 +0100 (CET)
Received: by intrepid.roeckx.be (Postfix, from userid 1000) id D973A1FE056F; Mon, 12 Jan 2015 22:46:43 +0100 (CET)
Date: Mon, 12 Jan 2015 22:46:43 +0100
From: Kurt Roeckx <kurt@roeckx.be>
To: Andrey Jivsov <crypto@brainhub.org>
Message-ID: <20150112214643.GA12418@roeckx.be>
References: <54AA4AB9.70505@brainhub.org> <54AA5AD3.9020009@shiftleft.org> <54AAEEFC.9060309@brainhub.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <54AAEEFC.9060309@brainhub.org>
User-Agent: Mutt/1.5.23 (2014-03-12)
Archived-At: <http://mailarchive.ietf.org/arch/msg/cfrg/hKIv3ju-ASHbLeZMELrsrE39FA0>
Cc: "cfrg@irtf.org" <cfrg@irtf.org>
Subject: Re: [Cfrg] On relative performance of Edwards v.s. Montgomery Curve25519, variable base
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jan 2015 21:46:52 -0000

On Mon, Jan 05, 2015 at 12:07:24PM -0800, Andrey Jivsov wrote:
> 
> A common assumption is that we need point compression in ECDH, from which it
> follows that Montgomery representation is a wash for p ~ 2^256.
[...]
> This is fine for authenticated keys, e.g. because these will be distributed
> in X.509 certificates, DNS records, etc.

It's my understanding that at least for TLS the consensus is to
drop ECDH in favour of ephemeral versions only.  As far as I know
it's also very uncommon to see it in X509 certificates.  Are there
going to be uses of static ECDH?


Kurt