ECC on Bare-Metal ARM Advisor(s): Erich Wenger, Mario Werner, Thomas Unterluggauer Institute for Applied Information Processing and Communications Graz University of Technology, Austria Motivation The current elliptic curve cryptography (ECC) standards face two challenges: trust and performance. As the widely deployed NIST curves were not generated verifiably at random and faster elliptic curves were found since its standardisation in 2000, the community is looking for alternatives. ARM Cortex-A9 processors with their NEON instruction-set are widely used to compare the different proposals. The goal is to independently verify the existing proposals, compare their (implementation) techniques, and maybe even come up with a new proposal. Goals and Tasks Understand basics of elliptic curve cryptography. Read up on the different (2-3) ECC proposals. Implement the finite-field arithmetic using NEON instructions on a Cortex-A9. Implement better point arithmetic. Literature D. J. Bernstein et al. How to manipulate curve standards: a white paper for the black hat https://eprint.iacr.org/2014/571 D. Hankerson, A. J. Menezes, and S. Vanstone Guide to Elliptic Curve Cryptography Springer, 2004 Deliverables Project files (zip, cleaned) Documentation (pdf) Presentation (pdf) Schedule Start Immediately Month 1 Reading literature Month 2 Implementing Month 3 Final deliverables Studies INF TEL SW TM Prerequisites C programming Basic understanding of assembly programming Advisor / Contact [email protected] IAIK 2015 Efficient Implementations
© Copyright 2024 ExpyDoc