Posted on 09/14/2015 10:02:20 PM PDT by dayglored
While Washington mulls ways to make crypto less effective, the industry, thank heavens, continues to push in the other direction. Microsoft Research has just published an elliptic curve library it reckons is considerably faster than what's currently available.
Outlined in this International Association for Cryptologic Research (IACR) paper, the implementation, the FourQLib, comes from noted Redmondian researchers Craig Costello and Patrick Longa.
The aim with FourQ sis to update today's elliptic curve cryptography (ECC) implementations like the National Institute of Science and Technology's (NIST's) P-256 and the non-NIST-influenced Curve25519 since one inevitability of crypto tech is that it will become obsolete.
That be-prepared approach also means a new ECC library needs to be fast, so that crypto doesn't become too great a burden on the processors handling it. Here's what the authors say about FourQ's performance:
On Intels Haswell, Ivy Bridge and Sandy Bridge architectures, our software computes a variable-base scalar multiplication in 59,000, 71,000 cycles and 74,000 cycles, respectively; and, on the same platforms, our software computes a Diffie-Hellman shared secret in 92,000, 110,000 cycles and 116,000 cycles, respectively."...
And importantly, the code has been made public it's available for download here for others to audit.
(Excerpt) Read more at theregister.co.uk ...
And they named it for YOU!
Microsoft in the crypto game ... I would laugh if it wasn’t so sad. They can’t even keep their own publicly offered software safe,
But, but I thought Microsoft was nothing more than a shill for the NSA.
Agreed, though it hurts my brain to say it.
Implementations of ECC stuff is tough though, this is going to have to be closely looked at.
Can someone translate this into English?
Maybe they decided that reputation was hurting them more than the shilling was worth, and they're comin' around?
I can't translate the crypto (I have only a vague understanding of what the elliptical stuff is about), so the best I can do is say, the guys in Redmond came up with some much-improved algorithms for encryption, faster and better than what presently exists, and they're making it available to the public for examination, critique, and use.
It's news not just because of the technology, but also because this is something Microsoft historically has not done often. They usually keep things for themselves, proprietarily, but if they did that with some new encryption scheme, nobody would trust it. So they sorta have to play open with it.
But I don't care what their internal motivation is -- I'm just pleased they're making it available.
Nothing yet.
Yep in 55 more years my non disclosure with the govt will be up and I can say more.
There's no pleasing the anti-MS trolls, is there? Why bother even saying anything? The fact that you said this tells me that you don't understand what this means.
Elliptical Curve Cryptography (ECC) is a newer form of cryptographic trapdoor that, up to this point, is not able to be cracked. Due to the nature of the mathematics behind the generation of an elliptical curve, it has significant advantages over a random number generator or the use of multiple primes in a complex logarithmic equation. A computer works best when given a set of variables to apply to an equation with an endpoint. ECC provides those variables (a prime number, a curve equation, and a public number) across a complex equation that is, again at this point, impossible to reverse without knowing the exact values selected.
Since ECC is so much more secure than standard number generation, the values selected for the encryption variables can be much smaller than normal which means the computer has to spend significantly less time crunching numbers to reach a prime or a curve equation. If you consider that an average CPU today runs around 3.00 GHz and there are at least 2 of them on a processor die in most PCs, that's 3 billion operations per second (times 2). The article states:
On Intels Haswell, Ivy Bridge and Sandy Bridge architectures, our software computes a variable-base scalar multiplication in 59,000, 71,000 cycles and 74,000 cycles, respectively; and, on the same platforms, our software computes a Diffie-Hellman shared secret in 92,000, 110,000 cycles and 116,000 cycles, respectively."
This means that on an average computer die, these keys can be generated in 1.967e-5 cycles or 50,000+ keys per second at a minimum; or one DH shared secret in 3.867e-5 cycles or 25862 DH shared secrets per second at a maximum.
The mathematics behind this are very complex and implementation in an operating environment has been slow to adopted. The fact that Microsoft has stepped up and done this tells me three things:
1. They want the public to have this power and they want the MS OS to lead the way with it
2. They are dedicated to encryption technologies against the advising of the US federal government
3. They want their operating environments to be as secure as possible
If you fail to see that and have nothing else to say other than something to bash Microsoft for their efforts, then you are no better than a fanboy having a conniption over a competitor's attempts to make the market stronger for the users overall.
Wasn’t (stupid Swype keyboard)
Now you know what every Apple thread poster has to endlessly endure. I am sorry that you have to put up with it too.
Maybe we can help by calling anyone who's critical of Microsoft a "hater".
I try to refrain from either but......Truth is hardware is not the deciding factor for me, it is the OS. I am a hobbyist now and am not likely to invest time in new skills at my age.
You will pardon us if we don't hold our breaths until then, I hope. GRIN!
If you want on or off the Mac Ping List, Freepmail me.
When encryption is outlawed, woeiru sosdidkx.z.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.