FourQ explained

FourQ
FourQ
Developer:Microsoft Research
Latest Release Version:v3.1
Programming Language:C
Operating System:Windows 10, Linux
Platform:IA-32, x86-64, ARM32, ARM64
Genre:Elliptic-curve cryptographic library
License:MIT License

In cryptography, FourQ is an elliptic curve developed by Microsoft Research. It is designed for key agreements schemes (elliptic-curve Diffie–Hellman) and digital signatures (Schnorr), and offers about 128 bits of security.[1] It is equipped with a reference implementation made by the authors of the original paper. The open source implementation is called FourQlib and runs on Windows and Linux and is available for x86, x64, and ARM.[2] It is licensed under the MIT License and the source code is available on GitHub.[3]

2127-1

.

History

The curve was published in 2015 by Craig Costello and Patrick Longa from Microsoft Research on ePrint.[1]

The paper was presented in Asiacrypt in 2015 in Auckland, New Zealand, and consequently a reference implementation was published on Microsoft's website.[2]

There were some efforts to standardize usage of the curve under IETF; these efforts were withdrawn in late 2017.[5]

Mathematical properties

The curve is defined by a twisted Edwards equation

-x2+y2=1+dx2y2

d

is a non-square in
F
p2
, where

p

is the Mersenne prime

2127-1

.

In order to avoid small subgroup attacks,[6] all points are verified to lie in an N-torsion subgroup of the elliptic curve, where N is specified as a 246-bit prime dividing the order of the group.

The curve is equipped with two nontrivial endomorphisms:

\psi

related to the

p

-power Frobenius map, and

\phi

, a low degree efficiently computable endomorphism (see complex multiplication).

Cryptographic properties

Security

The currently best known discrete logarithm attack is the generic Pollard's rho algorithm, requiring about

2122.5

group operations on average. Therefore, it typically belongs to the 128 bit security level.

In order to prevent timing attacks, all group operations are done in constant time, i.e. without disclosing information about key material.[1]

Efficiency

Most cryptographic primitives, and most notably ECDH, require fast computation of scalar multiplication, i.e.

[k]P

for a point

P

on the curve and an integer

k

, which is usually thought as distributed uniformly at random over

\{0,\ldots,N-1\}

.

Since we look at a prime order cyclic subgroup, one can write scalars

λ\psi,λ\phi

such that

\psi(P)=[λ\psi]P

and

\phi(P)=[λ\phi]P

for every point

P

in the N-torsion subgroup.

Hence, for a given

k

we may write

k=a1+a2λ\phi+a3λ\psi+a4λ\phiλ\psi\pmodN

If we find small

ai

, we may compute

[k]P

quickly by utilizing the implied equation

[k]P=[a1]P+[a2]\phi(P)+[a3]\psi(P)+[a4]\phi(\psi(P))

Babai rounding technique[7] is used to find small

ai

. For FourQ it turns that one can guarantee an efficiently computable solution with

ai<264

.

Moreover, as the characteristic of the field is a Mersenne prime, modulations can be carried efficiently.

Both properties (four dimensional decomposition and Mersenne prime characteristic), alongside usage of fast multiplication formulae (extended twisted Edwards coordinates), make FourQ the currently fastest elliptic curve for the 128 bit security level.

Uses

FourQ is implemented in the cryptographic library CIRCL, published by Cloudflare.[8]

See also

External links

Notes and References

  1. Costello . Craig . Longa . Patrick . FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime . 2015 . 23 May 2019 .
  2. Web site: FourQlib . Microsoft Research . 23 May 2019.
  3. Web site: References. . 4 October 2021.
  4. Longa . Patrick . Sica . Francesco . Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication . 23 May 2019 . 2011 . 1106.5149 .
  5. draft-ladd-cfrg-4q-01 . Ietf Datatracker . 27 March 2017 . 23 May 2019. Ladd . Watson . Longa . Patrick . Barnes . Richard .
  6. Book: van Oorschot . Paul C. . Wiener . Michael J. . Advances in Cryptology — EUROCRYPT '96 . On Diffie-Hellman Key Agreement with Short Exponents . 1070 . 1996 . 332–343 . 10.1007/3-540-68339-9_29 . Springer Berlin Heidelberg . Lecture Notes in Computer Science . 978-3-540-61186-8 . free .
  7. Babai . L. . On Lovász' lattice reduction and the nearest lattice point problem . Combinatorica . 1 March 1986 . 6 . 1 . 1–13 . 10.1007/BF02579403 . 7914792 . 1439-6912.
  8. Web site: Introducing CIRCL . blog.cloudflare.com . 20 June 2019 . 28 July 2019.