The Curve:<\/h2>\n
FourQ is a high-security, high-performance elliptic curve that targets the 128-bit security level [1]. It is defined by the twisted Edwards equation:<\/p>\n
E(GF(p<\/em>2<\/sup>)): \u00a0–x<\/em>2<\/sup> + y<\/em>2<\/sup> = 1 + dx<\/em>2<\/sup>y<\/em>2<\/sup>,<\/p>\n where p<\/em> is the Mersenne prime p<\/em> = 2127 <\/sup>– 1 and d<\/em> is a non-square in GF(p<\/em>2<\/sup>). FourQ comes equipped with two efficiently computable endomorphisms which enable four-dimensional scalar decompositions. The powerful combination of these\u00a0endomorphisms together with\u00a0the use\u00a0of complete, extended twisted Edwards coordinates and very efficient arithmetic over\u00a0p<\/em> = 2127 <\/sup>– 1 facilitates\u00a0scalar multiplications that are significantly faster than any other\u00a0available alternative.<\/p>\n 1.\u00a0 Variable-base scalar multiplication (e.g., this is used for computing the shared secret in the Diffie-Hellman key exchange)<\/p>\n 2.\u00a0 Fixed-base scalar multiplication (e.g., this can be used for key generation in the Diffie-Hellman key exchange)<\/p>\n 3.\u00a0 Double-scalar multiplication, for digital signature verification<\/p><\/blockquote>\n<\/blockquote>\n<\/blockquote>\n The FourQ Library is no longer actively maintained, but is available for research purposes at: https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=52310 (opens in new tab)<\/span><\/a><\/p>\n [1] Craig Costello and Patrick Longa, \u201cFourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime\u201d, in Advances in Cryptology – ASIACRYPT 2015 (to appear), 2015. Extended version available at: http:\/\/eprint.iacr.org\/2015\/565 (opens in new tab)<\/span><\/a><\/p>\nLibrary Features:<\/h2>\n
\n
\n
\n
\n
Download:<\/h2>\n
Reference:<\/h2>\n