<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Hardware Components for Post-Quantum Elliptic Curves Cryptography</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rodrigue Elias</string-name>
          <email>rodrigue.elias@liu.edu.lb</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Hlukhov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohammed Rahma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Zholubak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>. Computers Dept., Lviv Polytechnic National University, UKRAINE</institution>
          ,
          <addr-line>Lviv, 12 Bandera Str.</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>. School of Engineering at Lebanese International University, LEBANON</institution>
          ,
          <addr-line>Beirut, 2</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>1</fpage>
      <lpage>3</lpage>
      <abstract>
        <p>Investigations in the sphere of quantum calculations form up new challenges in the public key cryptography. Currently known public key crypto algorithms may be compromised with the implementation of quantum computers. The workgroups of ETSI and NIST determined the promising trends, within the framework of which there could be obtained acceptable solutions and one of the trends is the use of algorithms that process points of supersingular elliptic curves. Hardware implementations of components for processing points of elliptic curves are well known. The purpose of this publication is to investigate how they can be used to process points of supersingular elliptic curves.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>The advent of large-scale quantum computing offers great
promise to science and society, but brings with it a
significant threat to global information infrastructure.
Publickey cryptography - widely used on the internet today – relies
upon mathematical problems that are believed to be difficult
to solve given the computational power available now and in
the medium term.</p>
      <p>However, popular cryptographic schemes based on these
hard problems – including Elliptic Curve Cryptography – will
be easily broken by a quantum computer. This will rapidly
accelerate the obsolescence of currently deployed security
systems and will have dramatic impacts on any industry
where information needs to be kept secure.</p>
      <p>Quantum-safe cryptography refers to efforts to identify
algorithms that are resistant to attacks by both classical and
quantum computers, to keep information assets secure even
after a large-scale quantum computer has been built [1].</p>
      <p>Supersingular isogeny Diffie–Hellman key
exchange (SIDH) is a post-quantum cryptographic algorithm
used to establish a secret key between two parties over an
otherwise insecure communications channel. It is analogous
to the Diffie–Hellman key exchange, but is designed to
resist cryptanalytic attack by an adversary in possession of
a quantum computer.</p>
      <p>II. THE SUPERSINGULAR ISOGENY
DIFFIE</p>
    </sec>
    <sec id="sec-2">
      <title>HELLMAN BACKGROUND</title>
      <p>The supersingular isogeny Diffie-Hellman (SIDH) method
works with the set of supersingular elliptic curves E over
Galois Field GF( p 2 ) . An isogeny of an elliptic curve E is
a rational map from E to another elliptic curve E' which is
also a group homomorphism. Provided the isogenies
are separable, they are determined by the points inside
their kernel up to isomorphisms of E'.</p>
      <p>The SIDH method works with a prime of the form
p = ( wA )eA ( wB )eB ( f ) ± 1 where wA and wB are small
primes and an elliptic curve E defined by the equation:
y 2 = x 3 + ax + b . SIDH builds an isogeny map from a
single elliptic curve point which is taken as the generator for
the isogeny's kernel. This point is chosen to be a random
linear combination to two fixed points chosen to be in the
kernel of the isogeny.</p>
      <p>The j-invariant of an elliptic curve E is a fixed function of
a set of isomorphic curves. It is computed from the
parameters that define the curve. For an elliptic curve E
defined by the equation: y 2 = x 3 + ax + b the j-invariant
4a 3 + 27b 2</p>
      <p>The security of SIDH is closely related to the problem of
finding the isogeny mapping between two supersingular
elliptic curves with the same number of points. In [3] it was
shown that the security of SIDH will be O(p1/4) for classical
computers and O(p1/6) for quantum computers. This suggests
that SIDH with a 768-bit prime (p) will have a 128-bit
security level.</p>
      <p>In 2014, researchers at the University of Waterloo
developed a software implementation of SIDH. They ran
their partially optimized code on an x86-64 processor running
at 2.4 GHz. For a 768-bit modulus they were able to complete
the key exchange computations in 200 milliseconds thus
demonstrating that the SIDH is computationally practical [4].</p>
      <p>In 2016, researchers from Microsoft posted software for
the SIDH which runs in constant time (thus protecting against
timing attacks) and is the most efficient implementation to
date [5].</p>
      <p>In 2017, researchers from Florida Atlantic University
developed the first FPGA implementations of SIDH for
83bit and 124-bit quantum security levels [6].</p>
    </sec>
    <sec id="sec-3">
      <title>III. DEFINITION OF ISOGENY</title>
      <p>
        For supersingular elliptic curves there is well known Vélu
algorithm [
        <xref ref-type="bibr" rid="ref4">7</xref>
        ] for isogeny [
        <xref ref-type="bibr" rid="ref5">8</xref>
        ]: Let E1 and E2 be elliptic
curves over the field F. The isogeny E1 E2 over F is a
nonconstant rational mapping over F, which is also a group
homomorphism
( x, y ) →(
f1 ( x, y ) , g1 ( x, y )
f 2 ( x, y ) g 2 ( x, y )
) , where f1, g1, f2,
g2 are polynomials. For example, F = GF(19) ,
elliptic curve E1: y2 = x3 + x + 1;
elliptic curve E2: y2 = x3 + 4x + 13
#E1 = #E2 = 21;
      </p>
      <p>x 3 − 4 x 2 − 8 x − 8 x 3 y − 6 x 2 y − 5xy − 6 y
( x, y ) →( ,</p>
      <p>x 2 − 4 x − 4 x 3 − 6 x 2 − 7 x − 8</p>
      <p>So, to determine the isogeny, it is necessary to perform the
operations of addition, multiplication and inverse element
calculation in the Galois field GF(p2).
) .</p>
      <p>IV. ESTIMATION OF THE SOFTWARE TIME
COMPLEXITY OF OPERATIONS IN THE GALOIS</p>
    </sec>
    <sec id="sec-4">
      <title>FIELDS</title>
      <p>
        In works [
        <xref ref-type="bibr" rid="ref9">11</xref>
        ] and [
        <xref ref-type="bibr" rid="ref10">12</xref>
        ], the evaluation of the ability of data
protection means to counteract attacks by hackers was carried
out. The definition of Galois field in which hackers work
hardest was the purpose of the study. It was assumed that
hackers use software methods.
      </p>
      <p>
        One of the computer system hacking methods is the
bruteforce method [
        <xref ref-type="bibr" rid="ref5">8</xref>
        ], in which the general-purpose computer
selects all sorts of keys or passwords until one of them fits.
The same operations over Galois fields elements are
performed both during the execution of the hack program and
in the hardware crypto processors. For general purpose
computers, it is possible to estimate the time of execution of
the main operation, multiplication of the Galois fields
elements, for extended fields with different characteristics,
but with approximately the same order. The basis for such a
check you can take the field GF(2999). The calculations you
can make using the Maple 2017 package [
        <xref ref-type="bibr" rid="ref7">9</xref>
        ]. The relative
times of execution of such number of multiplications with
respect to the time of execution of the same number of
operations in the binary field GF(2999) are shown Table 1 and
in the Fig. 1 where prime p≈2999 is characteristic of prime
GF(p).
1,60
1,40
1,20
1,00
0,80
0,60
0,40
0,20
0,00
Relative Multiplication Time
      </p>
      <p>Field Characteristic
2
3
5
7</p>
      <p>The relative time complexity was determined by the ratio
of the multiplication time in the field GF(dm) to the
multiplication time in the field GF(2999).</p>
      <p>As can be seen from the Table 1, software multiplication of
triple extended field elements has the longest execution time.
It provides hardware cryptoprocessors based on such fields
additional protection against hacking. Software-implemented
operations on simple field elements are executed in the
fastest way, that indicates the inappropriateness of
cryptographic processors based on such fields. Multiplication
in binary fields has one of the highest time complexity, it is</p>
      <p>Re lative time comple xity</p>
      <p>V. ESTIMATION OF THE HARDWARE TIME
COMPLEXITY OF OPERATIONS IN THE GALOIS</p>
      <p>FIELDS</p>
      <p>
        Implemented in modern FPGA hardware multipliers for
extended Galois field GF (dm) with approximately the same
number of elements dm ≈ 2n were estimated in [
        <xref ref-type="bibr" rid="ref11">13</xref>
        ] in terms
of their time complexity to determine the fields in which the
multiplier will have the least time complexity. Relative to
GF(2n) results of estimation is shown in Fig. 2.
      </p>
    </sec>
    <sec id="sec-5">
      <title>VI. ESTIMATION OF THE SOFTWARE</title>
      <p>HARDWARE TIME COMPLEXITY OF</p>
      <p>OPERATIONS IN THE GALOIS FIELDS</p>
      <p>We will assume that the hardware implementation is used
by users of data protection tools, and software is used by
hackers. Then we can introduce a generalized time
complexity index. We will calculate this indicator as the ratio
of software time complexity to hardware time complexity for
the same fields. When the value of this indicator is greater,
then hackers will have more problems, so data protection will
be better.
2
3
4
5
6
7
8
9</p>
      <p>Results of hardware-software complexity estimation is
shown in Fig. 3.</p>
      <p>As can be seen from Fig. 3, the trial and binary Galois
fields provide the best data protection. Fields with large
characteristics provide weaker protection. The use of
hardware tools for working in such fields has less effect than
for working in binary and trial fields. As result the use of
hardware tools to work in the field with the characteristic 768
[3] also has less effect than for working in binary and ternary
fields.</p>
      <p>The use of isogenies of supersingular elliptic curves is
oriented toward usage of Galois field with big characteristics,
so they are focused on software implementation.
Re lative HS-Comle xity</p>
      <p>Field Charact erist ic</p>
      <p>The use of isogenies of supersingular elliptic curves is
oriented toward software implementation of the method.
Hardware implementation of this method will not provide
such a reduction in time complexity and increase the degree
of data protection as it provides in methods oriented on
binary fields.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>De Feo</surname>
            , Luca; Jao,
            <given-names>Plut.</given-names>
          </string-name>
          <article-title>"Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies" (PDF)</article-title>
          .
          <source>PQCrypto 2011</source>
          . Springer. Retrieved4 May
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Fishbein</surname>
          </string-name>
          ,
          <source>Dieter (30 April</source>
          <year>2014</year>
          ).
          <article-title>"Machine-Level Software Optimization of Cryptographic Protocols"</article-title>
          . University of Waterloo Library - Electronic
          <string-name>
            <surname>Theses</surname>
          </string-name>
          . University of Waterloo.
          <source>Retrieved 21 June</source>
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Costello</surname>
          </string-name>
          , Craig; Longa, Patrick; Naehrig,
          <string-name>
            <surname>Michael</surname>
          </string-name>
          (
          <year>2016</year>
          -01-01).
          <article-title>"Efficient algorithms for supersingular isogeny Diffie-Hellman" Koziel</article-title>
          , Brian; Kermani, Mehran; Azarderakhsh,
          <string-name>
            <surname>Reza</surname>
          </string-name>
          (
          <year>2016</year>
          -11-07).
          <article-title>"Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA"</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Jean</given-names>
            <surname>Vélu</surname>
          </string-name>
          .
          <article-title>Isogénies entre courbes elliptiques</article-title>
          . Comptes Rendus de l'Académie des Sciences de Paris,
          <volume>273</volume>
          :
          <fpage>238</fpage>
          -
          <lpage>241</lpage>
          ,
          <year>1971</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[8] SIKE protocol and its stability to classical and quantum attacks</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>https://www.ruscrypto.ru/resource/archive/rc2018/files/ 02_Taraskin.pdf</mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[9] Password cracking</article-title>
          . https://en.wikipedia.org/wiki/Password_cracking.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [10]
          <article-title>Maple User Manual</article-title>
          .
          <article-title>Copyright © Maplesoft, a division of Waterloo Maple Inc</article-title>
          .
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Hlukhov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zholubak</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kostyk</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rahma</surname>
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          ),
          <source>Galois Fields Elements Processing Units for Cryptographic Data Protection in Cyber-Physical Systems. Advances in Cyber-Physical Systems. Volume II, Number</source>
          <volume>2</volume>
          ,
          <year>2017</year>
          . © Lviv Polytechnic National University, pp.
          <fpage>9</fpage>
          -
          <lpage>18</lpage>
          , in press.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Rodrigue</surname>
            <given-names>Elias</given-names>
          </string-name>
          , Valerii Hlukhov, Mohammed Rahma, Ivan Zholubak.
          <article-title>FPGA cores for fast multiplicative inverse calculation in Galois Fields</article-title>
          . 9th
          <source>International IEEE Conference Dependable Systems, Services and Technologies DESSERT'2018 UKRAINE, KYIV, MAY 24-27</source>
          ,
          <year>2018</year>
          , in press.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Elias</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Rahma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Hlukhov</surname>
          </string-name>
          .
          <article-title>Multipliers for Galois fields Time Complexity</article-title>
          .
          <source>ELECTROTECHNIC AND COMPUTER SYSTEMS. Science and Technical. Odessa</source>
          , No.
          <volume>22</volume>
          (
          <issue>98</issue>
          )
          <year>2016</year>
          . Pp.
          <volume>323</volume>
          -
          <fpage>327</fpage>
          (In Ukrainian)
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>