You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 

171 lines
7.5 KiB

  1. July 11, 2014:
  2. This is mostly a cleanup release.
  3. Added CRANDOM_MIGHT_IS_MUST config flag (default: 1). When set, this
  4. causes crandom to assume that all features in the target arch will
  5. be available, instead of detecting them. This makes sense because
  6. the rest of the Goldilocks code is not (yet?) able to detect features.
  7. Also, I'd like to submit this to SUPERCOP eventually, and SUPERCOP won't
  8. pass -DMUST_HAVE_XXX on the command line the way the Makefile here did.
  9. Flag EXPERIMENT_CRANDOM_BUFFER_CUTOFF_BYTES to disable the crandom
  10. output buffer. This buffer improves performance (very marginally at
  11. Goldilocks sizes), but can cause problems with forking and VM
  12. snapshotting. By default, the buffer is now disabled.
  13. I've slightly tweaked the Elligator implementation (which is still
  14. unused) to make it easier to invert. This makes anything using Elligator
  15. (i.e. nothing) incompatible with previous releases.
  16. I've been factoring "magic" constants such as curve orders, window sizes,
  17. etc into a few headers, to reduce the effort to port the code to other
  18. primes, curves, etc. For example, I could test the Microsoft curves, and
  19. something like:
  20. x^2 + y^2 = 1 +- 5382[45] x^2 y^2 mod 2^480-2^240-1
  21. ("Goldeneye"? "Ridinghood"?) might be a reasonable thing to try for
  22. 64-bit CPUs.
  23. In a similar vein, most of the internal code has been changed to say
  24. "field" instead of p448, so that a future version of magic.h can decide
  25. which field header to include.
  26. You can now `make bat` to create an eBAT in build/ed448-goldilocks. This
  27. is only minimally tested, though, because SUPERCOP doesn't work on my
  28. machine and I'm too lazy to reverse engineer it. It sets a new macro,
  29. SUPERCOP_WONT_LET_ME_OPEN_FILES, which causes goldilocks_init() to fall
  30. back to something horribly insecure if crandom_init_from_file raises
  31. EMFILE.
  32. Slightly improved documentation.
  33. Removed some old commented-out code; restored the /* C-style */ comment
  34. discipline.
  35. The AMD-64 version should now be GCC clean, at least for reasonably
  36. recent GCC (tested on OS X.9.3, Haswell, gcc-4.9).
  37. History no longer says "2104".
  38. May 3, 2014:
  39. Minor changes to internal routines mean that this version is not
  40. compatible with the previous one.
  41. Added ARM NEON code.
  42. Added the ability to precompute multiples of a partner's public key. This
  43. takes slightly longer than a signature verification, but reduces future
  44. verifications with the precomputed key by ~63% and ECDH by ~70%.
  45. goldilocks_precompute_public_key
  46. goldilocks_destroy_precomputed_public_key
  47. goldilocks_verify_precomputed
  48. goldilocks_shared_secret_precomputed
  49. The precomputation feature are is protected by a macro
  50. GOLDI_IMPLEMENT_PRECOMPUTED_KEYS
  51. which can be #defined to 0 to compile these functions out. Unlike most
  52. of Goldilocks' functions, goldilocks_precompute_public_key uses malloc()
  53. (and goldilocks_destroy_precomputed_public_key uses free()).
  54. Changed private keys to be derived from just the symmetric part. This
  55. means that you can compress them to 32 bytes for cold storage, or derive
  56. keypairs from crypto secrets from other systems.
  57. goldilocks_derive_private_key
  58. goldilocks_underive_private_key
  59. goldilocks_private_to_public
  60. Fixed a number of bugs related to vector alignment on Sandy Bridge, which
  61. has AVX but uses SSE2 alignment (because it doesn't have AVX2). Maybe I
  62. should just switch it to use AVX2 alignment?
  63. Beginning to factor out curve-specific magic, so as to build other curves
  64. with the Goldilocks framework. That would enable fair tests against eg
  65. E-521, Ed25519 etc. Still would be a lot of work.
  66. More thorough testing of arithmetic. Now uses GMP for testing framework,
  67. but not in the actual library.
  68. Added some high-level tests for the whole library, including some (bs)
  69. negative testing. Obviously, effective negative testing is a very difficult
  70. proposition in a crypto library.
  71. March 29, 2014:
  72. Added a test directory with various tests. Currently testing SHA512 Monte
  73. Carlo, compatibility of the different scalarmul functions, and some
  74. identities on EC point ops. Began moving these tests out of benchmarker.
  75. Added scan-build support.
  76. Improved some internal interfaces. Made a structure for Barrett primes
  77. instead of passing parameters individually. Moved some field operations
  78. to places that make more sense, eg Barrett serialize and deserialize. The
  79. deserialize operation now checks that its argument is in [0,q).
  80. Added more documentation.
  81. Changed the names of a bunch of functions. Still not entirely consistent,
  82. but getting more so.
  83. Some minor speed improvements. For example, multiply is now a couple cycles
  84. faster.
  85. Added a hackish attempt at thread-safety and initialization sanity checking
  86. in the Goldilocks top-level routines.
  87. Fixed some vector alignment bugs. Compiling with -O0 should now work.
  88. Slightly simplified recode_wnaf.
  89. Add a config.h file for future configuration. EXPERIMENT flags moved here.
  90. I've decided against major changes to SHA512 for the moment. They add speed
  91. but also significantly bloat the code, which is going to hurt L1 cache
  92. performance. Perhaps we should link to OpenSSL if a faster SHA512 is desired.
  93. Reorganize the source tree into src, test; factor arch stuff into src/arch_*.
  94. Make most of the code 32-bit clean. There's now a 32-bit generic and 32-bit
  95. vectorless ARM version. No NEON version yet because I don't have a test
  96. machine (could use my phone in a pinch I guess?). The 32-bit version still
  97. isn't heavily optimized, but on ARM it's using a nicely reworked signed/phi-adic
  98. multiplier. The squaring is also based on this, but could really stand some
  99. improvement.
  100. When passed an even exponent (or extra doubles), the Montgomery ladder should
  101. now be accept points if and only if they lie on the curve. This needs
  102. additional testing, but it passes the zero bit exponent test.
  103. On 32-bit, use 8x4x14 instead of 5x5x18 table organization. Probably there's
  104. a better heuristic.
  105. March 5, 2014:
  106. First revision.
  107. Private keys are now longer. They now store a copy of the public key, and
  108. a secret symmetric key for signing purposes.
  109. Signatures are now supported, though like everything else in this library,
  110. their format is not stable. They use a deterministic Schnorr mode,
  111. similar to EdDSA. Precomputed low-latency signing is not supported (yet?).
  112. The hash function is SHA-512.
  113. The deterministic hashing mode needs to be changed to HMAC (TODO!). It's
  114. currently envelope-MAC.
  115. Probably in the future there will be a distinction between ECDH key and
  116. signing keys (and possibly also MQV keys etc).
  117. Began renaming internal functions. Removing p448_ prefixes from EC point
  118. operations. Trying to put the verb first. For example,
  119. "p448_isogeny_un_to_tw" is now called "twist_and_double".
  120. Began documenting with Doxygen. Use "make doc" to make a very incomplete
  121. documentation directory.
  122. There have been many other internal changes.
  123. Feb 21, 2014:
  124. Initial import and benchmarking scripts.
  125. Keygen and ECDH are implemented, but there's no hash function.