Re: [TLS] [Cfrg] V1.1 of MSR ECCLib for NUMS Curves library released (now supporting GCC on Linux)
Hannes Tschofenig <hannes.tschofenig@gmx.net> Sun, 20 July 2014 19:21 UTC
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20C711B29B1; Sun, 20 Jul 2014 12:21:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q1N3zgAscMA4; Sun, 20 Jul 2014 12:21:44 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37D051B296C; Sun, 20 Jul 2014 12:21:44 -0700 (PDT)
Received: from [192.168.10.128] ([66.207.208.102]) by mail.gmx.com (mrgmx103) with ESMTPSA (Nemesis) id 0MFu0Y-1XLbbY0GCE-00EwDs; Sun, 20 Jul 2014 21:21:38 +0200
Message-ID: <53CC16BF.3080108@gmx.net>
Date: Sun, 20 Jul 2014 21:21:35 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Brian LaMacchia <bal@microsoft.com>, "tls@ietf.org" <tls@ietf.org>, "cfrg@ietf.org" <cfrg@ietf.org>
References: <32919a77a6ba4b2aab3c446b087ad979@BL2PR03MB242.namprd03.prod.outlook.com>
In-Reply-To: <32919a77a6ba4b2aab3c446b087ad979@BL2PR03MB242.namprd03.prod.outlook.com>
X-Enigmail-Version: 1.5.2
OpenPGP: id=4D776BC9
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="gKvR9uL9QCjw2pEh3haRj3cLBs7hhCiXk"
X-Provags-ID: V03:K0:kcanRWmfn29/GHSrROVSHmTa3EOdiUqWNLIw1xWb04GgP/cEtRy YQsRyyiBgBkURLdmrcjjwFh8g4b/eXyacjfDUPZutSWuuYIcq+ZiF++v0RP5CzCfyQjkFRE mSjOP7jFDqVnEj3RGGGDKsbMtDPFQHpHqDmbG1RzJW1/2xcqrBqmhlQfhIosxTC69x3PD2i 29NXK+aIXbujra9fD2tkQ==
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/9xn-NWlBro34RIGFQwpDk3Z1Szk
Subject: Re: [TLS] [Cfrg] V1.1 of MSR ECCLib for NUMS Curves library released (now supporting GCC on Linux)
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Jul 2014 19:21:47 -0000
Hi Brian, thanks for sharing the code. I am wondering whether you also have a version that does not make use of assembler code since I cannot run this code on 32-bit ARM processors. Ciao Hannes On 07/20/2014 08:56 PM, Brian LaMacchia wrote: > Folks, > > > > Microsoft Research is pleased to announce the release of v1.1 of the MSR > Elliptic Curve Cryptography Library for NUMS curves. Please visit > > > > http://research.microsoft.com/en-us/projects/nums/ > > > > for full details and download links. New features in v1.1 include: > > > > · GCC support on Linux: The new pre-assembly files .S located > in <LibraryPath>/MSR_ECCLib/AMD64 are compatible with both GNU GCC (GAS > assembler) and MSVS (MASM assembler) compilers > > · New API for ephemeral elliptic curve Diffie-Hellman key > exchange (ECDHE) > > · New tests for ECDHE > > · Simplified API for some ECC scalar multiplication functions > > · Extended support to any x64 processor > > > > We welcome questions/comments/feedback on this library; please send them > to msrsc@microsoft.com <mailto:msrsc@microsoft.com>. > > > > Thanks, > > > > > --bal > > > > -----Original Message----- > From: Brian LaMacchia > Sent: Monday, June 30, 2014 3:58 AM > To: cfrg@ietf.org; tls@ietf.org > Subject: Announcing the availability of the MSR Elliptic Curve > Cryptography Library for NUMS Curves > > > > Dear members of the IRTF CFRG and the IETF TLS WG, > > > > On behalf of the Microsoft Research ECCLib Project, I am pleased to > announce the first release of the Microsoft Research Elliptic Curve > Cryptography Library (ECCLib) for NUMS (“Nothing Up My Sleeve”) curves. > We are releasing ECCLib under the Apache 2.0 License. Here is a link to > the project page and download location: > > > > http://research.microsoft.com/en-us/projects/nums/ > > > > The MSR ECCLib is an efficient cryptography library that provides > functions for computing essential elliptic curve operations on a new set > of high-security curves as previously described in [1] and presented at > the CFRG Spring 2014 Interim Meeting (see [2] for a copy of the slides > from that presentation). All computations in ECCLib on secret data > exhibit regular, constant-time execution, providing protection against > timing and cache attacks. > > > > ECCLib supports six high-security elliptic curves proposed in [1], which > cover three security levels (128-, 192-, and 256-bit security) and two > curve models. The curves have a very simple and deterministic generation > with minimal room for parameter manipulation. ECCLib includes all the > ECC functions necessary to implement most popular elliptic curve-based > schemes. In particular, ECCLib supports the computation of scalar > multiplication for the six curves above in three variants: > > 1. Variable-base scalar multiplication (e.g., this is > used for computing the shared key in the Diffie-Hellman key exchange). > > 2. Fixed-base scalar multiplication (e.g., this is used > for key generation in the Diffie-Hellman key exchange). > > 3. Double-scalar multiplication. This operation is > typically used for verifying signatures. > > > > As both the CFRG and the TLS WG are currently considering additional > curves for elliptic curve cryptography, we hope that this contribution > (in addition to the technical paper previously presented) will further a > thoughtful discussion concerning what new curves CFRG should recommend > and TLS should consider for inclusion. We welcome > questions/comments/feedback on this library; please send them to > msrsc@microsoft.com <mailto:msrsc@microsoft.com>. > > > > Please Note: the version of ECCLib that we are releasing today is for > x64 platforms with AVX and builds with the Microsoft Visual Studio > toolchain. We are actively working on both a version that builds with > GCC and also a portable C version and hope to add these to the release > in the near future. > > > > Thanks, > > > > > --bal > > > > [1] Joppe W. Bos, Craig Costello, Patrick Longa and Michael Naehrig, > “Selecting Elliptic Curves for Cryptography: An Efficiency and Security > Analysis”, Cryptology ePrint Archive: Report 2014/130. Available at: > http://eprint.iacr.org/2014/130 > > > > [2] > http://patricklonga.webs.com/Presentation_CFRG_Selecting_Elliptic_Curves_for_Cryptography.pdf > > > > > > > > _______________________________________________ > Cfrg mailing list > Cfrg@irtf.org > http://www.irtf.org/mailman/listinfo/cfrg >
- [TLS] V1.1 of MSR ECCLib for NUMS Curves library … Brian LaMacchia
- Re: [TLS] [Cfrg] V1.1 of MSR ECCLib for NUMS Curv… Hannes Tschofenig
- Re: [TLS] [Cfrg] V1.1 of MSR ECCLib for NUMS Curv… Brian LaMacchia