Diversity and Transparency for ECC Jean-Pierre Flori, Jrme Plt, - - PowerPoint PPT Presentation

diversity and transparency for ecc
SMART_READER_LITE
LIVE PREVIEW

Diversity and Transparency for ECC Jean-Pierre Flori, Jrme Plt, - - PowerPoint PPT Presentation

Diversity and Transparency for ECC Jean-Pierre Flori, Jrme Plt, Jean-Ren Reinhard, and Martin Eker ANSSI and NCSA/SW June 11, 2015 J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 1 / 32 I Standardization J.-P.


slide-1
SLIDE 1

Diversity and Transparency for ECC

Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, and Martin Ekerå

ANSSI and NCSA/SW

June 11, 2015

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 1 / 32

slide-2
SLIDE 2

I – Standardization

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 2 / 32

slide-3
SLIDE 3

Standardization

Need for standardization?

In general, the group of rational points of an elliptic curve behaves as a “generic group”: the DLOG problem has exponential complexity, provided: The curve cardinality includes a large prime factor q.

Solution: use curves with (almost) prime cardinality.

The DLOG problem can not be transferred into weaker groups.

Solution: avoid weak curves.

Applying these solutions is computationally expensive: curves can not be generated on demand.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 3 / 32

slide-4
SLIDE 4

Standardization

Standardized curves

Year Curves Sizes 2000 NIST 192, 224, 256, 384, 521 2005 Brainpool 160, 192, 224, 256, 320, 384, 512 2010 OSCCA 256 2011 ANSSI 256 Plus a few academic propositions (Curve25519/41417, NUMS, Ed448-Goldilocks, . . . ).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 4 / 32

slide-5
SLIDE 5

Standardization

Need for a second round?

The first curves were standardized in years 2000 when: it was possible to find curves with prime cardinality (SEA algorithm); weak classes of curves were identified. We think that these curves are still secure. . . . . . but new concerns emerged since then: what about the generation process? (is there some hidden secret vulnerability?) what about side-channel attacks? what about scientific progess in related domains (e.g. DLOG in finite fields)? It is a good time to standardize new curves.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 5 / 32

slide-6
SLIDE 6

II – Security

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 6 / 32

slide-7
SLIDE 7

Security

Five classes of criteria

1 The DLOG problem should be hard. 2 Implementations should be safe (e.g. resist side-channel attacks). 3 The curve should exhibit no particularities. 4 Implementations can be optimized. 5 (The curve exhibits interesting properties.)

Tradeoffs Some conditions are incompatible: this is a good reason to standardize different (families of ) curves. Base field We only deal with prime base fields as we think that extension fields introduce more vulnerabilities without valuable properties.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 7 / 32

slide-8
SLIDE 8

Security DLOG problem difficulty

DLOG problem difficulty

Large prime subgroup: Attacks with complexity O( √ q) exist where q is the largest prime factor of N. It is mandatory that:

q ≈ N (P ≈

1 log p , costly).

At best q = N (no complete addition law!).

Weak curves: For some curves the DLOG problem can be transferred into a weaker finite field. It is mandatory that:

∆ = 0 (P ≈ 1, free); N = p (P ≈ 1, free); the embedding degree must be large (P ≈ 1, costly).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 8 / 32

slide-9
SLIDE 9

Security Safe implementation

Safe implementation

Even though the DLOG problem is hard on the curve, implementations might leak information. Example: scalar multiplication using naive “double-and-add” algorithm. D A D D D A D A 1 1 1

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 9 / 32

slide-10
SLIDE 10

Security Safe implementation

Classical countermeasures

Against simple attacks: avoid branching depending on secret elements.

“double-and-add” always; Montgomery ladder.

Against differential attacks: avoid using secrets elements repeatedly.

secret masking; curve masking; point masking.

This is not enough: information can still leak!

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 10 / 32

slide-11
SLIDE 11

Security Safe implementation

Further countermeasures

Masking inefficiency Avoid base field with special prime cardinality (no fast reduction!). Exceptional cases Use a curve with a complete addition law (no prime cardinality!). Special points Ensure no points with a zero coordinate exist (no complete addition law!).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 11 / 32

slide-12
SLIDE 12

Security Safe implementation

Misbehavior resistance

Subgroup attacks Ensure no small subgroups exist (P = 1 if N is prime, no complete addition law!). Twist attacks Use a twist with prime cardinality (P ≈

1 log p , does not leverage all checks!).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 12 / 32

slide-13
SLIDE 13

Security Genericity

Resist attacks to come?

What if we don’t know all classes of weak curves? Avoid producing too “special” curves! Verify properties satisfied with P ≈ 1 in the sense of the DLOG problem difficulty. In particular, some numbers attached to the curve should be “large enough”. The curve should look generic.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 13 / 32

slide-14
SLIDE 14

Security Genericity

Numbers attached to a curve

Discriminant of the endomorphism ring In general, the discriminant satisfies |DE | ≈ p ; therefore, |DE | ≥ √ p with P ≈ 1 − O(1/ √ p) (no pairings, no fast endomorphism!). Class number friability In general, the class number hE has at least a prime divisor ≥ (log p)O(1). Embedding degree The embedding degree is ≥ p1/4 with P ≥ 1 − 1/ √ p (no pairings!).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 14 / 32

slide-15
SLIDE 15

Security Genericity

Numbers attached to a curve (II)

Twist cardinality In general, the twist cardinality N1 has at least a prime divisor ≥ (log p)O(1). DLOG in the base field The base field cardinality p should be pseudo-random (no fast reduction!). √ p − 1 has a prime divisor ≥ (log p)2 with P ≥ 1 − 1/ p.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 15 / 32

slide-16
SLIDE 16

Security Genericity

Summary

NIST Brainpool ANSSI OSCCA N prime . . . . p ordinary . . . Complete law Twist secure Generic . . . NUMS Curve25519/41417 Ed448-Goldilocks N prime p ordinary Complete law . . . Twist secure . . . Generic

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 16 / 32

slide-17
SLIDE 17

Security Optimized implementation

Optimized implementation

Curves with N < p points (half of them). Fast computation of square roots (p = 3 (mod 4)). Fast modular reduction (special primes, inefficient masking!). Small coefficients for the curve equation (no genericity!). Specific system of coordinates (some entail no prime cardinality!).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 17 / 32

slide-18
SLIDE 18

Security Diversity

Different criteria for different uses

The aforementioned criteria are conflicting. In particular, tradeoffs to be made between genericity/speed. . . . . . but also between optimization/side-channel security. Only the first class of criteria is mandatory to ensure the DLOG problem difficulty. The other classes of criteria mostly affect speed and ease of implementation. Use (and standardize) different (families of ) curves!

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 18 / 32

slide-19
SLIDE 19

Security Diversity

Real zoo

Weierstrass Edwards

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 19 / 32

slide-20
SLIDE 20

Security Diversity

Real zoo (II)

Jacobi Hess

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 20 / 32

slide-21
SLIDE 21

Security Diversity

Finite field zoo

Frog Cockroach

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 21 / 32

slide-22
SLIDE 22

Security Diversity

Finite field zoo (II)

Walrus Bunny

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 22 / 32

slide-23
SLIDE 23

III – Transparency

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 23 / 32

slide-24
SLIDE 24

Transparency Certificates for elliptic curves

Architecture

Provide curves fulfilling a selection of criteria. . . . . . together with a certificate for faster verification of:

the number of points, the discriminant and class number properties, the embedding degree.

A deterministic algorithm to sample curves. . . . . . and producing a certificate:

Completely reproducible generation process. Either pseudo-random (for genericity) or by enumeration of increasing values (for efficiency). Certify every step, including rejected curves.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 24 / 32

slide-25
SLIDE 25

Transparency Certificates for elliptic curves

Cardinality of curves

Prime order Certificate: (G, q, Π) where G = 0 is s.t. q · G = 0 with q ≥ p − 2√ p + 1, and Π a primality proof for q. Size and verification in O(log 2p), generally only generated once. Composite order Certificate: (P, n, c), where P = 0 is s.t. n · P = 0 with n < 2( √ p − 1)2, and c a composition witness for n. Size in O(log p), generation and verification in O(log 2p). More efficient verification using early-abort SEA information about small torsion points.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 25 / 32

slide-26
SLIDE 26

Transparency Generation process

Example

Sampling function from the seed s:

p = smallest prime ≥ s; g = smallest generator of F×

p ;

equations of the form y 2 = x 3 − 3x + b, b = g, g2 , ... .

Conditions:

N et N1 prime; ∆ = 0, N, N1 = p, p + 1; embedding degrees of E, E 1 at least p1/4; class number ≥ p1/4 .

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 26 / 32

slide-27
SLIDE 27

Transparency Generation process

Certificate

From the seed s = 2015: p = 2017, g = 5,

Curve (2017, -3, 625)

  • rder = 2063, point = (0, 25)

twist_order = 1973 disc_factors = {6043} class_number = 9, form = (17,3,89) embedding_degree = 1031, factors = {2, 1031} twist_embedding_degree = 493, factors = {2, 17, 29} Rejected curves ((2017, -3, 5), composite, 2065, witness, 1679, point, (1,258)) ((2017, -3, 25), torsion_point, 3, point, (448, 288)) ((2017, -3, 125), torsion_point, 2, point, (982, 0))

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 27 / 32

slide-28
SLIDE 28

Transparency Generation process

Non-manipulability

Such a process produces deterministically a curve from:

a set of conditions (including numerical bounds), a sampling function (including potential seed).

No rigidity but still transparency. Only a few conditions will actually affect the process:

twist security, smoothness bounds.

When a seed is needed, suspicion can be avoided:

using a share-commitment scheme; using unpredictable and unmanipulable values (sports results, stock values, lottery results, sunspot observations, . . . ).

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 28 / 32

slide-29
SLIDE 29

Transparency Generation process

Seed generation

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 29 / 32

slide-30
SLIDE 30

IV – Conclusion

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 30 / 32

slide-31
SLIDE 31

Conclusion

Diversity and Transparency for ECC

Diversity International standards should: not restrict to a single curve or family of related elliptic curves; include a “generic” elliptic curve. Transparency All details about the generation process should be: public and “transparent”; annonced before the actual generation.

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 31 / 32

slide-32
SLIDE 32

Conclusion

Questions?

J.-P. Flori (ANSSI) Diversity and Transparency for ECC June 11, 2015 32 / 32