Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
DOI:
https://doi.org/10.13154/tches.v2018.i1.1-17Keywords:
Diffie-Hellman key exchange, hyperelliptic curve cryptography, Kummer surface, FPGA, Zynq, low-latency, high-throughput, fault countermeasureAbstract
We present the first hardware implementations of Diffie-Hellman key exchange based on the Kummer surface of Gaudry and Schost’s genus-2 curve targeting a 128-bit security level. We describe a single-core architecture for lowlatency applications and a multi-core architecture for high-throughput applications. Synthesized on a Xilinx Zynq-7020 FPGA, our architectures perform a key exchange with lower latency and higher throughput than any other reported implementation using prime-field elliptic curves at the same security level. Our single-core architecture performs a scalar multiplication with a latency of 82 microseconds while our multicore architecture achieves a throughput of 91,226 scalar multiplications per second. When compared to similar implementations of Microsoft’s Fourℚ on the same FPGA, this translates to an improvement of 48% in latency and 40% in throughput for the single-core and multi-core architecture, respectively. Both our designs exhibit constant-time execution to thwart timing attacks, use the Montgomery ladder for improved resistance against SPA, and support a countermeasure against fault attacks.Published
2018-02-14
Issue
Section
Articles
License
Copyright (c) 2018 Philipp Koppermann, Fabrizio De Santis, Johann Heyszl, Georg Sigl
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve. (2018). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(1), 1-17. https://doi.org/10.13154/tches.v2018.i1.1-17