To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

In cryptography, FourQ is an elliptic curve developed by Microsoft Research. It is designed for key agreements schemes (elliptic-curve Diffie–Hellman) and digital signatures (Schnorr), and offers about 128 bits of security.[1] It is equipped with a reference implementation made by the authors of the original paper. The open source implementation is called FourQlib and runs on Windows and Linux and is available for x86, x64, and ARM.[2] It is licensed under the MIT License and the source code is available on GitHub.[3]

Its name is derived from the four dimensional Gallant–Lambert–Vanstone scalar multiplication, which allows high performance calculations.[4] The curve is defined over a two dimensional extension of the prime field defined by the Mersenne prime .

YouTube Encyclopedic

  • 1/5
    Views:
    32 449
    390
    1 202
    992
    744
  • How to present qualitative findings
  • Post-Quantum Cryptography in IoT world - Dr. Reza Azarderakhsh, PQSecure Technologies
  • Modular Robots
  • Elliptic Curves, Group Law, and Efficient Computation
  • Dave Chappelle @ Comic Strip Live Feb. 2009 (Better Audio)

Transcription

History

The curve was published in 2015 by Craig Costello and Patrick Longa from Microsoft Research on ePrint.[1]

The paper was presented in Asiacrypt in 2015 in Auckland, New Zealand, and consequently a reference implementation was published on Microsoft's website.[2]

There were some efforts to standardize usage of the curve under IETF; these efforts were withdrawn in late 2017.[5]

Mathematical properties

The curve is defined by a twisted Edwards equation

is a non-square in , where is the Mersenne prime .

In order to avoid small subgroup attacks,[6] all points are verified to lie in an N-torsion subgroup of the elliptic curve, where N is specified as a 246-bit prime dividing the order of the group.

The curve is equipped with two nontrivial endomorphisms: related to the -power Frobenius map, and , a low degree efficiently computable endomorphism (see complex multiplication).

Cryptographic properties

Security

The currently best known discrete logarithm attack is the generic Pollard's rho algorithm, requiring about group operations on average. Therefore, it typically belongs to the 128 bit security level.

In order to prevent timing attacks, all group operations are done in constant time, i.e. without disclosing information about key material.[1]

Efficiency

Most cryptographic primitives, and most notably ECDH, require fast computation of scalar multiplication, i.e. for a point on the curve and an integer , which is usually thought as distributed uniformly at random over .

Since we look at a prime order cyclic subgroup, one can write scalars such that and for every point in the N-torsion subgroup.

Hence, for a given we may write

If we find small , we may compute quickly by utilizing the implied equation

Babai rounding technique[7] is used to find small . For FourQ it turns that one can guarantee an efficiently computable solution with .

Moreover, as the characteristic of the field is a Mersenne prime, modulations can be carried efficiently.

Both properties (four dimensional decomposition and Mersenne prime characteristic), alongside usage of fast multiplication formulae (extended twisted Edwards coordinates), make FourQ the currently fastest elliptic curve for the 128 bit security level.

Uses

FourQ is implemented in the cryptographic library CIRCL, published by Cloudflare.[8]

See also

References

  1. ^ a b c Costello, Craig; Longa, Patrick (2015). "FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime". Retrieved 23 May 2019. {{cite journal}}: Cite journal requires |journal= (help)
  2. ^ a b "FourQlib". Microsoft Research. Retrieved 23 May 2019.
  3. ^ "References". GitHub. 4 October 2021.
  4. ^ Longa, Patrick; Sica, Francesco (2011). "Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication". arXiv:1106.5149. Retrieved 23 May 2019. {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ Ladd, Watson; Longa, Patrick; Barnes, Richard (27 March 2017). "draft-ladd-cfrg-4q-01". Ietf Datatracker. Retrieved 23 May 2019.
  6. ^ van Oorschot, Paul C.; Wiener, Michael J. (1996). "On Diffie-Hellman Key Agreement with Short Exponents". Advances in Cryptology — EUROCRYPT '96. Lecture Notes in Computer Science. Vol. 1070. Springer Berlin Heidelberg. pp. 332–343. doi:10.1007/3-540-68339-9_29. ISBN 978-3-540-61186-8.
  7. ^ Babai, L. (1 March 1986). "On Lovász' lattice reduction and the nearest lattice point problem". Combinatorica. 6 (1): 1–13. doi:10.1007/BF02579403. ISSN 1439-6912. S2CID 7914792.
  8. ^ "Introducing CIRCL". blog.cloudflare.com. 20 June 2019. Retrieved 28 July 2019.

External links

This page was last edited on 7 July 2023, at 02:52
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.