attachment
<div dir="ltr"><div><div><div><div><div>Hi,<br><br></div>For those who care about next generation crypto directions<br></div>(like TLS 1.3 requirements and recommendations), from the<br></div>IRTF Cryptography Research Group list.<br>
<br></div>Cheers,<br></div>- Ira<br><div><div><div><div><div><div><div><div dir="ltr"><div style="display:inline"></div><div style="display:inline"></div><div style="display:inline"></div><div></div><div></div><div></div>
<div></div></div></div>
<br></div><div>PS - A related acronym to NUMS ("Nothing Up My Sleeve")<br></div><div>is NUTS ("Nothing Up Their Sleeve"), an oblique reference<br></div><div>to some government agencies...<br><br></div>
<div><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Brian LaMacchia</b> <span dir="ltr"><<a href="mailto:bal@microsoft.com">bal@microsoft.com</a>></span><br>
Date: Mon, Jun 30, 2014 at 3:58 AM<br>Subject: [Cfrg] Announcing the availability of the MSR Elliptic Curve Cryptography Library for NUMS Curves<br>To: "<a href="mailto:cfrg@ietf.org">cfrg@ietf.org</a>" <<a href="mailto:cfrg@ietf.org">cfrg@ietf.org</a>>, "<a href="mailto:tls@ietf.org">tls@ietf.org</a>" <<a href="mailto:tls@ietf.org">tls@ietf.org</a>><br>
<br><br>Dear members of the IRTF CFRG and the IETF TLS WG,<br>
<br>
On behalf of the Microsoft Research ECCLib Project, I am pleased to announce the first release of the Microsoft Research Elliptic Curve Cryptography Library (ECCLib) for NUMS ("Nothing Up My Sleeve") curves. We are releasing ECCLib under the Apache 2.0 License. Here is a link to the project page and download location:<br>
<br>
<a href="http://research.microsoft.com/en-us/projects/nums/" target="_blank">http://research.microsoft.com/en-us/projects/nums/</a><br>
<br>
The MSR ECCLib is an efficient cryptography library that provides functions for computing essential elliptic curve operations on a new set of high-security curves as previously described in [1] and presented at the CFRG Spring 2014 Interim Meeting (see [2] for a copy of the slides from that presentation). All computations in ECCLib on secret data exhibit regular, constant-time execution, providing protection against timing and cache attacks.<br>
<br>
ECCLib supports six high-security elliptic curves proposed in [1], which cover three security levels (128-, 192-, and 256-bit security) and two curve models. The curves have a very simple and deterministic generation with minimal room for parameter manipulation. ECCLib includes all the ECC functions necessary to implement most popular elliptic curve-based schemes. In particular, ECCLib supports the computation of scalar multiplication for the six curves above in three variants:<br>
1. Variable-base scalar multiplication (e.g., this is used for computing the shared key in the Diffie-Hellman key exchange).<br>
2. Fixed-base scalar multiplication (e.g., this is used for key generation in the Diffie-Hellman key exchange).<br>
3. Double-scalar multiplication. This operation is typically used for verifying signatures.<br>
<br>
As both the CFRG and the TLS WG are currently considering additional curves for elliptic curve cryptography, we hope that this contribution (in addition to the technical paper previously presented) will further a thoughtful discussion concerning what new curves CFRG should recommend and TLS should consider for inclusion. We welcome questions/comments/feedback on this library; please send them to <a href="mailto:msrsc@microsoft.com">msrsc@microsoft.com</a>.<br>
<br>
Please Note: the version of ECCLib that we are releasing today is for x64 platforms with AVX and builds with the Microsoft Visual Studio toolchain. We are actively working on both a version that builds with GCC and also a portable C version and hope to add these to the release in the near future.<br>
<br>
Thanks,<br>
<br>
--bal<br>
<br>
[1] Joppe W. Bos, Craig Costello, Patrick Longa and Michael Naehrig, "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis", Cryptology ePrint Archive: Report 2014/130. Available at: <a href="http://eprint.iacr.org/2014/130" target="_blank">http://eprint.iacr.org/2014/130</a><br>
<br>
[2] <a href="http://patricklonga.webs.com/Presentation_CFRG_Selecting_Elliptic_Curves_for_Cryptography.pdf" target="_blank">http://patricklonga.webs.com/Presentation_CFRG_Selecting_Elliptic_Curves_for_Cryptography.pdf</a><br>
<br>
<br>
_______________________________________________<br>
Cfrg mailing list<br>
<a href="mailto:Cfrg@irtf.org">Cfrg@irtf.org</a><br>
<a href="http://www.irtf.org/mailman/listinfo/cfrg" target="_blank">http://www.irtf.org/mailman/listinfo/cfrg</a><br>
</div><br></div></div></div></div></div></div></div>