Machine-Level Software Optimization of Cryptographic Protocols
dc.contributor.author | Fishbein, Dieter | |
dc.date.accessioned | 2014-04-30T20:14:44Z | |
dc.date.available | 2014-04-30T20:14:44Z | |
dc.date.issued | 2014-04-30 | |
dc.date.submitted | 2014 | |
dc.description.abstract | This work explores two methods for practical cryptography on mobile devices. The first method is a quantum-resistant key-exchange protocol proposed by Jao et al.. As the use of mobile devices increases, the deployment of practical cryptographic protocols designed for use on these devices is of increasing importance. Furthermore, we are faced with the possible development of a large-scale quantum computer in the near future and must take steps to prepare for this possibility. We describe the key-exchange protocol of Jao et al. and discuss their original implementation. We then describe our modifications to their scheme that make it suitable for use in mobile devices. Our code is between 18-26% faster (depending on the security level). The second is an highly optimized implementation of Miller's algorithm that efficiently computes the Optimal Ate pairing over Barreto-Naehrig curves proposed by Grewal et al.. We give an introduction to cryptographic pairings and describe the Tate pairing and its variants. We then proceed to describe Grewal et al.'s implementation of Miller's algorithm, along with their optimizations. We describe our use of hand-optimized assembly code to increase the performance of their implementation. For the Optimal Ate pairing over the BN-446 curve, our code is between 7-8% faster depending on whether the pairing uses affine or projective coordinates. | en |
dc.identifier.uri | http://hdl.handle.net/10012/8400 | |
dc.language.iso | en | en |
dc.pending | false | |
dc.publisher | University of Waterloo | en |
dc.subject | cryptography | en |
dc.subject | cryptology | en |
dc.subject | key-exchange | en |
dc.subject | pairings | en |
dc.subject | BN-curves | en |
dc.subject | isogenies | en |
dc.subject | elliptic curves | en |
dc.subject | Tate pairing | en |
dc.subject | Optimal Ate pairing | en |
dc.subject | mobile devices | en |
dc.subject | post-quantum cryptography | en |
dc.subject | assembly language | en |
dc.subject.program | Combinatorics and Optimization | en |
dc.title | Machine-Level Software Optimization of Cryptographic Protocols | en |
dc.type | Master Thesis | en |
uws-etd.degree | Master of Mathematics | en |
uws-etd.degree.department | Combinatorics and Optimization | en |
uws.peerReviewStatus | Unreviewed | en |
uws.scholarLevel | Graduate | en |
uws.typeOfResource | Text | en |