ECC on Bare-Metal ARM - Institute of Applied Information

ECC on Bare-Metal ARM
Advisor(s): Erich Wenger, Mario Werner, Thomas Unterluggauer
Institute for Applied Information Processing and Communications
Graz University of Technology, Austria
Motivation
The current elliptic curve cryptography (ECC) standards face two challenges: trust and performance. As
the widely deployed NIST curves were not generated
verifiably at random and faster elliptic curves were
found since its standardisation in 2000, the community
is looking for alternatives.
ARM Cortex-A9 processors with their NEON
instruction-set are widely used to compare the different proposals. The goal is to independently verify the existing proposals, compare their (implementation) techniques, and maybe even come up with a
new proposal.
Goals and Tasks
Understand basics of elliptic curve cryptography.
Read up on the different (2-3) ECC proposals.
Implement the finite-field arithmetic using
NEON instructions on a Cortex-A9.
Implement better point arithmetic.
Literature
D. J. Bernstein et al.
How to manipulate curve standards: a white paper
for the black hat
https://eprint.iacr.org/2014/571
D. Hankerson, A. J. Menezes, and S. Vanstone
Guide to Elliptic Curve Cryptography
Springer, 2004
Deliverables
Project files (zip, cleaned)
Documentation (pdf)
Presentation (pdf)
Schedule
Start Immediately
Month 1 Reading literature
Month 2 Implementing
Month 3 Final deliverables
Studies
INF
TEL
SW
TM
Prerequisites
C programming
Basic understanding of assembly programming
Advisor / Contact
[email protected]
IAIK 2015
Efficient Implementations