1[![compilation](https://github.com/libecc/libecc/actions/workflows/libecc_compilation_tests.yml/badge.svg?branch=master)](https://github.com/libecc/libecc/actions/workflows/libecc_compilation_tests.yml) 2[![runtime](https://github.com/libecc/libecc/actions/workflows/libecc_runtime_tests.yml/badge.svg?branch=master)](https://github.com/libecc/libecc/actions/workflows/libecc_runtime_tests.yml) 3[![crossarch](https://github.com/libecc/libecc/actions/workflows/libecc_crossarch_tests.yml/badge.svg?branch=master)](https://github.com/libecc/libecc/actions/workflows/libecc_crossarch_tests.yml) 4[![python](https://github.com/libecc/libecc/actions/workflows/libecc_python_tests.yml/badge.svg?branch=master)](https://github.com/libecc/libecc/actions/workflows/libecc_python_tests.yml) 5[![examples](https://github.com/libecc/libecc/actions/workflows/libecc_examples.yml/badge.svg?branch=master)](https://github.com/libecc/libecc/actions/workflows/libecc_examples.yml) 6 7 8# libecc project 9 10## Copyright and license 11Copyright (C) 2017-2023 12 13This software is licensed under a dual BSD and GPL v2 license. 14See [LICENSE](LICENSE) file at the root folder of the project. 15 16## Authors 17 18 * Ryad BENADJILA (<mailto:ryadbenadjila@gmail.com>) 19 * Arnaud EBALARD (<mailto:arnaud.ebalard@ssi.gouv.fr>) 20 * Jean-Pierre FLORI (<mailto:jpflori@gmail.com>) 21 22## Contributors 23 * Nicolas VIVET (<mailto:nicolas.vivet@ssi.gouv.fr>) 24 * Karim KHALFALLAH (<mailto:karim.khalfallah@ssi.gouv.fr>) 25 * Niels SAMWEL (<mailto:nsamwel@google.com>) 26 27## Description 28This software implements a library for elliptic curves based 29cryptography (ECC). The API supports signature algorithms specified 30in the [ISO 14888-3:2018](https://www.iso.org/standard/76382.html) 31standard and some other signature algorithms as well as ECDH primitives, with the following specific curves and hash functions: 32 33 * **Signatures**: 34 * Core ISO 14888-3:2018 algorithms: ECDSA, ECKCDSA, ECGDSA, ECRDSA, EC{,O}SDSA, ECFSDSA, SM2. 35 * EdDSA (25519 and 448 as specified in [RFC 8032](https://datatracker.ietf.org/doc/html/rfc8032)). 36 * BIGN (as standardized in [STB 34.101.45-2013](https://github.com/bcrypto/bign)). We allow a more lax usage of 37 BIGN than in the standard as we allow any curve and any hash function. 38 * BIP0340, also known as the "Schnorr" Bitcoin proposal, as specified in [bip-0340](https://github.com/bitcoin/bips/blob/master/bip-0340.mediawiki). 39 We allow a more lax usage of BIP0340 than the standard as we allow any curve and any hash function (the standard mandates SECP256K1 with SHA-256). 40 41 * **ECDH**: 42 * ECC-CDH (Elliptic Curve Cryptography Cofactor Diffie-Hellman) as described in [section 5.7.1.2 of the NIST SP 800-56A Rev. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. 43 * X25519 and X448 as specified in [RFC7748](https://datatracker.ietf.org/doc/html/rfc7748) (with some specificities, see the details below). 44 * **Curves**: SECP{192,224,256,384,521}R1, SECP{192,224,256}K1, BRAINPOOLP{192,224,256,320,384,512}{R1,T1}, 45 FRP256V1, GOST{256,512}, GOSTR3410-2001-CryptoPro{A,B,C,XchA,XchB,Test}-ParamSet, GOSTR3410-2012-{256,512}-ParamSet{A,B,C}, GOSTR3410-2012-256-ParamSetD, GOSTR3410-2012-512-ParamSetTest, SM2P256V1, SM2P{192,256}Test, WEI{25519,448}, BIGN{256,384,512}V1. The library can be easily expanded with 46 user defined curves using a standalone helper script. 47 * **Hash functions**: SHA-2 and SHA-3 hash functions (224, 256, 384, 512), SM3, RIPEMD-160, 48GOST 34.11-2012 as described in [RFC 6986](https://datatracker.ietf.org/doc/html/rfc6986) 49(also known as [Streebog](https://tc26.ru/en/events/research-projects-competition/streebog-competition.html)), 50SHAKE256 in its restricted version with 114 bytes output (mainly for Ed448), BELT-HASH (as standardized in 51[STB 34.101.31-2011](https://github.com/bcrypto/belt)), and BASH-{224,256,384,512} (as standardized in 52[STB 34.101.77-2020](http://apmi.bsu.by/assets/files/std/bash-spec24.pdf)). 53**HMAC** based on any of these hash functions is also included. 54 55ECDSA comes in two variants: the classical non-deterministic one, and the **deterministic** ECDSA 56as described in [RFC 6979](https://datatracker.ietf.org/doc/html/rfc6979). The deterministic version 57generates nonces using a HMAC-DRBG process, and is suitable for situations where there is 58no RNG or where entropy sources are considered weak (please note that any leak on these nonces 59bits can lead to devastating attacks exploiting the [Hidden Number Problem](https://eprint.iacr.org/2020/615.pdf)). 60On the downside, the deterministic version of ECDSA is susceptible to [fault attacks](https://eprint.iacr.org/2017/1014.pdf). 61Hence, one will have to **carefully select** the suitable version to use depending on the usage and 62attack context (i.e. which of side-channel attacks or fault attacks are easier to perform). 63The same applies to BIGN that comes in two flavours as standardized in [STB 34.101.45-2013](https://github.com/bcrypto/bign): 64non-deterministic and deterministic (following an iterative generation process using the BELT hash function and its underlying block cipher). 65 66The library also supports EdDSA (Ed25519 and Ed448) as defined in [RFC 8032](https://datatracker.ietf.org/doc/html/rfc8032) with 67all their variants (with context, pre-hashed). 68Since the core of the library supports short Weierstrass curves, and as 69EdDSA uses instead Twisted Edwards curves with dedicated formulas, we use 70**isogenies** as described in the [lwig-curve-representations](https://datatracker.ietf.org/doc/html/draft-ietf-lwig-curve-representations) 71draft. Isogenies are transformations (homomorphisms that are almost isomorphisms) between 72curves models, allowing to implement operations on one model by operating with 73formulas on another model. Concretely, in our case we perform computations on 74the Weierstrass WEI25519 that is isogenic to Ed25519 (Twisted Edwards) 75and Curve25519 (Montgomery) curves. This, of course, induces overheads in computations 76while having the great benefit of keeping the library core mathematical foundations simple 77and keep the defense-in-depth (regarding software security and side-channels) focused on 78a rather limited part: see the discussions below on libecc efforts with regards to security. 79 80Please note that as for deterministic ECDSA and BIGN, EdDSA signatures are trivially susceptible to 81[fault attacks](https://eprint.iacr.org/2017/1014.pdf) without having a non-deterministic 82variant. Hence, when using EdDSA one will have to either ensure that the usage context naturally prevents 83such attacks, that the platform implements countermeasures (e.g. using secure MCUs, etc.) or that 84other means allow to detect/mitigate such attacks (e.g. on the compilation toolchain side). 85 86Please refer to [this CFRG thread](https://mailarchive.ietf.org/arch/browse/cfrg/?gbt=1&index=5l3XCLHLCVfOmnkcv4mo2-pEV94) 87for more insight on why deterministic versus non-deterministic EC signature schemes is still an open debate 88and how the usage context and **attack model** is **crucial** when choosing to use one or the other. 89 90 91**Batch verification** is implemented for the signature algorithms that support it - the signature schemes 92that preserve some "reversible" projective point coordinate information in the signature value. 93This is the case for some "Schnorr" based schemes, namely ECFSDSA ("full Schnorr" from ISO14888-3), EdDSA and BIP0340. 94Batch verification allows (thanks to the Bos-Coster algorithm) to bring speedups between 2 to 6.5 times 95the regular verification for batches of at least 10 signatures, which is not negligible depending on the usage. 96Beware that for the specific case of BIP0340, results might depend on the underlying prime of the curve, since 97the batch verification makes heavy use of square root residues and the Tonelli-Shanks algorithm complexity 98is sensitive to the prime "form" (e.g. is equal to 1 modulo 4, etc.). Finally, beware that the speedup of 99batch verification comes at an increased memory cost: the Bos-Coster algorithm requires a scratchpad memory space 100that increases linearly with the number of signatures to be checked. 101 102 103Regarding the specific case of ECRDSA (the Russian standard), libecc implements by default the 104[RFC 7091](https://datatracker.ietf.org/doc/html/rfc7091) and [draft-deremin-rfc4491-bis](https://datatracker.ietf.org/doc/html/draft-deremin-rfc4491-bis) 105versions to comply with the standard test vectors (provided in the form of X.509 certificates). 106This version of the algorithm **differs** from the ISO/IEC 14888-3 description and test vectors, 107the main difference coming from the way the hash of the message to be signed/verified is processed: 108in the RFCs, the little endian representation of the hash is taken as big number while in ISO/IEC the big endian 109representation is used. This seems (to be confirmed) to be a discrepancy of ISO/IEC 14888-3 algorithm description 110that must be fixed there. In order to allow users to still be able to reproduce the ISO/IEC behavior, we provide 111a compilation toggle that will force this mode `USE_ISO14888_3_ECRDSA=1`: 112 113<pre> 114 $ USE_ISO14888_3_ECRDSA=1 make 115</pre> 116 117**ECDH (Elliptic Curve Diffie-Hellman)** variants are also implemented in the 118library. Classical ECDH over Weierstrass curves is implemented in the form 119of ECC-CDH (Elliptic Curve Cryptography Cofactor Diffie-Hellman) as described 120in [section 5.7.1.2 of the NIST SP 800-56A Rev. 3](https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final) standard. Montgomery curves 121based algorithms (Curve25519 and Curve448) are included as specified in [RFC7748](https://datatracker.ietf.org/doc/html/rfc7748), 122although the implementation somehow diverges from the canonical ones as u coordinates on the curve 123quadratic twist are rejected (this is due to the underlying usage of isogenies to 124handle Montgomery curves). This divergence does not impact the ECDH use case though. 125 126 127Advanced usages of this library also include the possible implementation 128of elliptic curve based protocols as well as any algorithm 129on top of prime fields based elliptic curves (or prime fields, or rings 130of integers). Many examples are present in the [src/examples](src/examples) 131folder, notable ones being: 132 * Pollard-Rho, Miller-Rabin and square residues over finite fields. 133 * The RSA cryptosystem as defined in the PKCS#1 [RFC8017](https://datatracker.ietf.org/doc/html/rfc8017) 134standard. This implementation also comes with the integration of deprecated hash 135functions such as MD2, MD4, MD5, SHA-0, SHA-1, MDC-2, GOSTR34-11-94 and so on in order to be compliant with existing 136signatures (e.g. in X.509). These primitives are **not** included in the core 137library on purpose: they are **dangerous and broken** and must only be used for 138tests purposes. 139 * The DSA cryptosystem as defined in [FIPS 186-4](https://csrc.nist.gov/publications/detail/fips/186/4/final). 140 * The SDSA (Schnorr DSA) as defined in ISO14888-3 141 * The KCDSA (Korean DSA) as defined in ISO14888-3 142 * The GOSTR34-10-94 function as defined in [RFC4491](https://www.rfc-editor.org/rfc/rfc4491) 143 * The SSS (Shamir Secret Sharing) algorithm over a prime field of 256 bits. 144 145 146**NOTE**: for all the primitives (specifically relevant for signature primitives), a maximum 147allowed size for big numbers is **4096 bits** with word size **64 bits** (this will be less 148for word sizes 16 and 32 bits). This is due to an internal limitation of libecc 149on big numbers allocation documented [here](include/libecc/nn/nn_config.h). We can live with 150this limitation as the library is primarily intended to focus on ECC based algorithms. 151However, one should be aware that for example RSA with modulus > 4096 will fail (as well 152and DSA and other El-Gamal based algorithms): these primitives are only included as 153examples and should be used with care. 154 155**NOTE**: handling 4096 bits NN numbers must be explicitly configured at compilation 156time using the `-DUSER_NN_BIT_LEN=4096` toggle in the `CFLAGS` or `EXTRA_CFLAGS` as explained 157in [the dedicated section](https://github.com/ANSSI-FR/libecc#modifying-the-big-numbers-size). 158 159 160Compared to other cryptographic libraries providing such 161features, the differentiating points are: 162 163 * A focus on code readability and auditability. The code is pure C99, 164 with no dynamic allocation and includes pre/post-asserts in the code. 165 Hence, this library is a good candidate for embedded targets (it should be 166 easily portable accross various platforms). 167 * A clean layer separation for all needed mathematical abstractions and 168 operations. Strong typing (as "strong" as C99 allows, of course) of 169 mathematical objects has been used in each layer. 170 * The library has NOT been designed to break performance records, though 171 it does a decent job (see the [performance section discussion](#performance)). Similarly, 172 the library memory footprint (in terms of ROM and RAM usage) is not the 173 smallest achievable one (though some efforts have been made to limit it 174 and fit "common" platforms, see the [dedicated section](#constrained-devices)). 175 * libecc library core has **no external dependency** (not even the standard 176 libc library) to make it portable. See the 177 [section about portability](#compatibility-and-portability) for more information. 178 179## Building 180 181### Building the static libraries and the signature self tests 182 183The main [Makefile](Makefile) is in the root directory, and compiling is as simple as 184executing: 185 186<pre> 187 $ make 188</pre> 189 190By default, compilation is quiet. **Verbose compilation** (i.e. showing all the compilation 191executed commands) can be achieved using the `VERBOSE=1` toggle: 192 193<pre> 194 $ VERBOSE=1 make 195</pre> 196 197This will compile different elements in the [build](build/) directory: 198 199 * Three **archive** static libraries, each one containing (based on) the previous ones: 200 * **libarith.a**: this library contains the Natural Numbers (NN) and Finite field over primes 201 (Fp) arithmetic layers. 202 * **libec.a**: this library is based on libarith.a and contains the EC curves implementation 203 (points abstraction, point addition/doubling formulas and scalar multiplication). 204 * **libsign.a**: this library is based on libec.a and contains all our ISO 14888-3 signature 205 algorithms over some statically defined curves and hash functions. 206 * Two binaries based on the libsign.a static library: 207 * **ec\_self\_tests**: the self tests for signature/verification algorithm of ISO 14888-3 208 with known and random test vectors, as well as performance tests. Launching the self tests without 209 an argument will execute the three tests (known and fixed test vectors, random sign/verify 210 checks, and performance measurements). One can also launch each test separately. 211 212 For known test vectors: 213<pre> 214 $ ./build/ec_self_tests vectors 215 ======= Known test vectors test =================== 216 [+] ECDSA-SHA224/secp224r1 selftests: known test vectors sig/verif ok 217 [+] ECDSA-SHA256/secp256r1 selftests: known test vectors sig/verif ok 218 [+] ECDSA-SHA512/secp256r1 selftests: known test vectors sig/verif ok 219 ... 220</pre> 221 222 For sign/verify checks (with random key pairs and random data): 223 224<pre> 225 $ ./build/ec_self_tests rand 226 ======= Random sig/verif test =================== 227 [+] ECDSA-SHA224/FRP256V1 randtests: random import/export with sig(0)/verif(0) ok 228 [+] ECDSA-SHA224/SECP224R1 randtests: random import/export with sig(0)/verif(0) ok 229 ... 230</pre> 231 232 For performance measurements: 233 234<pre> 235 $ ./build/ec_self_tests perf 236 ======= Performance test ===================== 237 [+] ECDSA-SHA224/FRP256V1 perf: 462 sign/s and 243 verif/s 238 [+] ECDSA-SHA224/SECP224R1 perf: 533 sign/s and 276 verif/s 239 ... 240</pre> 241 242**NOTE**: it is possible to parallelize self tests (known and random) using the 243[OpenMP](https://en.wikipedia.org/wiki/OpenMP) framework (usually packaged with 244most distros) by using the `OPENMP_SELF_TESTS=1` compilation toggle. This requires 245the `WITH_STDLIB` option (as it obviously uses the standard library). Performance 246tests are not parallelized due to possible shared ressources exhaustion between CPUs and cores 247(e.g. caches, Branch Prediction Units, etc.). 248 249- **ec\_utils**: a tool for signing and verifying user defined files, with a user 250provided signature algorithm/curve/hash function triplet. The tool can also be 251used to generate signature keys. 252 253 Generate keys for ECKCDSA over the BRAINPOOLP512R1 curve, with 254the 'mykeypair' prefix: 255<pre> 256 $ ./build/ec_utils gen_keys BRAINPOOLP512R1 ECKCDSA mykeypair 257</pre> 258 259 This will create four files. Two 260binary '.bin' files corresponding to the private key (mykeypair\_private\_key.bin) 261and the public key (mykeypair\_public\_key.bin). Two header '.h' files are also 262created, corresponding to a C style header version of the keys so that these can 263be included and used in a C program using libecc. Note that both kind of keys 264(public and private) include leading metadata (type, algorithm, curve, etc) for 265possible sanity checks when they are used (e.g. to detect passing of an ECDSA 266private key to an ECKCDSA signature call, etc). 267 268 Once the key pair has been created, 269one can sign a raw binary file named 'myfile' and store the signature in 270'sig.bin'. In the example below, we use SHA3\_512 as the hash function for 271the signature. BRAINPOOLP512R1 and ECKCDSA are explicitly given (matching the 272type of key we generated during previous step). Note that the call would yield 273an error if invalid parameters were given (thanks to the metadata elements 274described above). 275<pre> 276 $ ./build/ec_utils sign BRAINPOOLP512R1 ECKCDSA SHA3_512 myfile mykeypair_private_key.bin sig.bin 277</pre> 278 After this, a raw signature is created, mainly consisting of the ECKCDSA (r, s) big 279numbers concatenated (the length of this file should be 1024 bits = 2 x 512 bits). The signature can now be verified with 280the 'verify' command and the public key, the result being either **OK** or **failed**: 281<pre> 282 $ ./build/ec_utils verify BRAINPOOLP512R1 ECKCDSA SHA3_512 myfile mykeypair_public_key.bin sig.bin 283 Signature check of myfile OK 284</pre> 285 286 The ec\_utils tool can also be used to produce/verify **structured binaries** 287containing a header, raw binary and their signature (see the 'struct\_sign' and 'struct\_verify' commands for a help on 288this mode). The rationale behind these commands is to ease the production/verification of self-contained signed images 289(which can be useful when dealing with embedded firmware updates for instance). 290 291### Building the user examples 292 293Since it is possible to use libecc as a NN (**positive** Natural Numbers), Fp (Finite field over primes) or EC curve layer library, 294we provide some examples in the [src/examples](src/examples) folder. Compiling these examples is as simple as: 295<pre> 296 $ cd src/examples 297 $ make 298</pre> 299 300* NN layer examples: 301 * [src/examples/basic/nn_miller_rabin.c](src/examples/basic/nn_miller_rabin.c): this example implements the 302 [Miller-Rabin](https://en.wikipedia.org/wiki/Miller%E2%80%93Rabin_primality_test) composition (or probabilistic primality) test as 303 described in the [Handbook of Applied Cryptography (4.29)](http://cacr.uwaterloo.ca/hac/about/chap4.pdf). 304 * [src/examples/basic/nn_pollard_rho.c](src/examples/nn_pollard_rho.c): this example is a straightforward 305 implementation of the [Pollard's Rho](https://en.wikipedia.org/wiki/Pollard%27s_rho_algorithm) integer factorization 306 algorithm as specified in the [Handbook of Applied Cryptography (3.9)](http://cacr.uwaterloo.ca/hac/about/chap3.pdf). 307 308* Fp layer examples: 309 * [src/examples/basic/fp_square_residue.c](src/examples/basic/fp_square_residue.c): this is an implementation of 310 the [Tonelli-Shanks](https://en.wikipedia.org/wiki/Tonelli%E2%80%93Shanks_algorithm) algorithm for finding quadratic residues 311 over a prime field Fp. Given a prime field element x, the algorithm finds y so that y<sup>2</sup> = x (or informs that there 312 is no solution if this is the case). 313 314* Curves layer examples: 315 * [src/examples/basic/curve_basic_examples.c](src/examples/basic/curve_basic_examples.c): this example shows basic 316 features of libec for playing with elliptic curves group arithmetic, namely loading defined named curves, generating random points on 317 these curves, checking point addition and doubling formulas as well as scalar multiplication (both Montgomery and non Montgomery based). 318 319 * [src/examples/basic/curve_ecdh.c](src/examples/basic/curve_ecdh.c): the purpose of this code is to provide a toy example of 320 how to implement an [Elliptic Curve Diffie-Hellman](https://en.wikipedia.org/wiki/Elliptic_curve_Diffie%E2%80%93Hellman) protocol between two 321 entities 'Alice' and 'Bob' in order to produce a shared secret over a public channel. 322 323**WARNING**: these examples are **toy implementations** not to be used in a production environment (for instance, the code 324has neither been designed to be efficient nor robust against side channel attacks). Their purpose is only to show basic usage of the 325libarith and libec libraries. 326 327The **public headers** containing the functions to be used by higher level code are [include/libecc/libarith.h](include/libecc/libarith.h), 328[include/libecc/libec.h](include/libecc/libec.h) and [include/libecc/libsig.h](include/libecc/libsig.h): they are respectively used for the NN and Fp arithmetic layers, 329the Elliptic Curves layer, and the signature layer. 330 331More advanced examples are present in the examples folder: 332 333* Obsolete hash algorithms as an expansion to libecc core algorithms, in [src/examples/hash](src/examples/hash) (MD2, MD4, MD5, MDC2, SHA-0, 334SHA-1, and TDES for supporting MDC2). Please **be careful** when using them, it is advised to use them as toy primitives in **non-production code** 335(e.g. for checking old protocols and cipher suites). 336 337* Pre-ECC Signature schemes (based on Fp finite fields discrete logarithm) in [src/examples/sig](src/examples/sig) (RSA, DSA, SDSA, KCDSA, 338GOSTR34-10-94). Beware that for these signatures, you will have to expand the NN size to bigger values than the default (e.g. supporting RSA 4096 339will need a size of at least 4096 bits for NN, see how to expand the size in the documentation [here](include/libecc/nn/nn_config.h)). Although some 340efforts have been made when developing these signature algorithms, using them in production code should be decided with care (e.g. regarding 341side-channel attack and so on). 342 343* SSS (Shamir Secret Sharing) in [src/examples/sss](src/examples/sss). 344 345 346### Building the NN and Fp arithmetic tests 347 348libecc is provided with arithmetic random tests for the low level NN and Fp routines (addition, subtraction, logical 349operations, multiplication and Montgomery multiplication, ...). 350 351These tests are located inside the [src/arithmetic_tests/](src/arithmetic_tests/) folder. More specifically, the tests 352are split in two files: 353 354* [src/arithmetic_tests/arithmetic_tests.c](src/arithmetic_tests/arithmetic_tests.c): a '.c' file to be compiled and linked with libecc 355static library and performing a set of tests given on the standard input or in a file. The tests have a specific ASCII 356format with expected input/output as big numbers, and crafted **opcodes** defining the operation type (addition over 357NN, over Fp, ...). 358* [src/arithmetic_tests/arithmetic_tests_generator.py](src/arithmetic_tests/arithmetic_tests_generator.py): a python 359script that generates a set of arithmetic tests. 360 361### Building with the meson build system 362 363In parallel to the `Makefile` build system, a migration to the newer and more user friendly `meson` build is a 364**work in progress**. Compiling with `meson` can be simply achieved with: 365 366<pre> 367 $ meson setup builddir && cd builddir && meson dist 368</pre> 369 370Please note that you will need `meson`, `ninja` and `dunamai` (that can be installed from the Python `pip` installer). 371 372Most of libecc compilation options have been migrated, please check the output of the `meson configure` command to get 373a complete list of these (in the 'Project options' category). For instance, compiling libecc with a word size of 32 and 374a debug mode can be triggered with: 375 376<pre> 377 $ meson setup -Dwith_wordsize=32 -Dwith_debug=true builddir && cd builddir && meson dist 378</pre> 379 380## Configuring the libecc library 381 382### Basic configuration 383 384libecc can be statically configured at compilation time: the user can tune what curves, hash functions and signature 385algorithms are embedded in 'libsign.a' and all the binaries using it. 386 387The main entry point to configure/tune the library is [include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h). By default libecc 388embeds everything. In order to remove something, one has to **comment** the element to remove (i.e. comment the 389`WITH_XXX` macro). For instance, removing 390FRP256V1 is simply done by commenting the line: 391<pre> 392 /* Supported curves */ 393 /* #define WITH_CURVE_FRP256V1 */ /* REMOVING FRP256V1 */ 394 #define WITH_CURVE_SECP192R1 395 #define WITH_CURVE_SECP224R1 396 #define WITH_CURVE_SECP256R1 397 #define WITH_CURVE_SECP384R1 398 #define WITH_CURVE_SECP521R1 399 #define WITH_CURVE_BRAINPOOLP224R1 400 #define WITH_CURVE_BRAINPOOLP256R1 401 #define WITH_CURVE_BRAINPOOLP384R1 402 #define WITH_CURVE_BRAINPOOLP512R1 403 #define WITH_CURVE_GOST256 404 #define WITH_CURVE_GOST512 405 ... 406</pre> 407 408As another example, if one wants to build a custom project supporting only 409ECFSDA using SHA3-256 on BrainpoolP256R1, this can be done by keeping only the 410following elements in 411[include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h): 412 413<pre> 414 #define WITH_SIG_ECFSDSA 415 #define WITH_HASH_SHA3_256 416 #define WITH_CURVE_BRAINPOOLP256R1 417</pre> 418 419### Advanced configuration 420 421#### Modifying the word size 422 423libecc supports 16, 32 and 64 bits word sizes. Though this word size is usually inferred during compilation 424and adapted depending on the detected platform (to fit the best performance), the user can force it in three ways: 425 426* Overloading the `WORDSIZE` macro in [include/libecc/words/words.h](include/libecc/words/words.h). 427* Overloading the `WORDSIZE` macro in the Makefile `CFLAGS`. 428* Use specific Makefile targets. 429 430Please refer to the [portability guide](#libecc-portability-guide) for details on this. 431 432#### Modifying the big numbers size 433 434libecc infers the Natural Numbers maximum length from the **curves** parameters that have been statically 435defined in [include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h). Though this behaviour is perfectly fine and transparent 436for the user when dealing with the elliptic curves and signature layers, this can become a limitation when building 437code around the NN and Fp arithmetic layers. The user will be stuck with a hard coded maximum size of numbers depending 438on the curve that is used by libecc, which can be a nonsense if he is only interested in the big number basic 439algorithmic side (when the default curves are used, this maximum size is 521 bits, corresponding to SECP521 440parameters). 441 442libecc provides a way to **overload the NN maximum size**, with a strong limit depending on the word size (around 4435300 bits for 64-bit words, around 2650 bits for 32-bit words, and around 1300 bits for 16-bit words). See 444the comments in [include/libecc/nn/nn_config.h](include/libecc/nn/nn_config.h) for more details about this. In order to manually increase 445the NN size, the user will have to define the macro `USER_NN_BIT_LEN`, either directly in 446[include/libecc/nn/nn_config.h](include/libecc/nn/nn_config.h), or more appropriately through overloading the Makefile `CFLAGS` 447with `-DUSER_NN_BIT_LEN=` (see [the dedicated section](#overloading-makefile-variables) for more on how to do this). 448 449**NOTE**: objects and binaries compiled with different word sizes and/or user defined NN maximum bit lengths **are not compatible**, 450and could produce executables with dangerous runtime behaviour. In order to prevent possible honest mistakes, there is 451a safety net function catching such situations **at compilation time** in [include/libecc/nn/nn_config.h](include/libecc/nn/nn_config.h): the 452`nn_check_libconsistency` routine will throw an error. For instance, if 'libarith.a' has been compiled with 453`WORDSIZE=64`, and one tries to compile the arithmetic tests with `WORDSIZE=32`, here is the error the compiler 454should produce: 455 456<pre> 457... 458arithmetic_tests.c:(.text+0x3af21) : undefined reference to « nn_consistency_check_maxbitlen521wordsize32 » 459... 460</pre> 461 462#### Small RAM footprint devices (small stack usage) 463 464In order to squeeze the stack usage on very constrained devices, a `SMALLSTACK` toggle can be activated. Beware that this toggle 465removes some countermeasures (Itoh et al. masking) in order to fit in 8KB of RAM stack usage. Also beware that this is incompatible 466with EdDSA and X25519 as these specific functions need more than this amount of stack because of the isogenies usage (you should get 467a compilation error when trying to activate them with `SMALLSTACK=1`). 468 469<pre> 470$ SMALLSTACK=1 make 471</pre> 472 473 474## Expanding the libecc library 475 476Though libecc has been designed to be compiled with a static embedding of all its features (i.e. no dynamic modules 477loading), its **static code extensibility** has been a matter of attention. The library can be: 478* Easily expanded by **adding new curves**, with **zero coding effort**. Note that **only curves over prime fields are 479supported**. 480* Expanded with new hash functions and new signature algorithms with some coding effort, but clean and well defined 481APIs should ease this task. 482 483### Adding user defined curves 484 485A companion python script [scripts/expand_libecc.py](scripts/expand_libecc.py) will transparently add (and remove) new 486user defined curves in the source tree of the project. The '.h' headers defining the new curves 487will be created in a dedicated folder: [include/libecc/curves/user_defined/](include/libecc/curves/user_defined/). 488 489The python script should have a self explanatory and complete help: 490<pre> 491 $ python scripts/expand_libecc.py -h 492 This script is intented to *statically* expand the ECC library with user defined curves. 493 ... 494</pre> 495 496In order to add a curve, one can give explicit parameters (prime, order, ...) on the command line or 497provide a [RFC3279](https://www.ietf.org/rfc/rfc3279.txt) formatted ASN.1 file (DER or PEM) with the 498parameters. Sanity checks are performed by the script. The script is also able to generate 499**test vectors** for the new curve with the `--add-test-vectors` toggle. 500 501Let's show how we can add the BRAINPOOLP320R1 supported by OpenSSL. We use the `ecparam` option of 502the `openssl` command line: 503 504<pre> 505 $ openssl ecparam -param_enc explicit -outform DER -name brainpoolP320r1 -out brainpoolP320r1.der 506</pre> 507 508This creates a DER file 'brainpoolP320r1.der' embedding the parameters (beware of the `-param_enc explicit` 509option that is important here). Now, in order to add this new curve to libecc, we will execute: 510<pre> 511 $ python scripts/expand_libecc.py --name="mynewcurve" --ECfile=brainpoolP320r1.der --add-test-vectors=1 512 Test vectors generation asked: this can take some time! Please wait ... 513 1/56 514</pre> 515 516This will create a new header file 'ec_params_user_defined_mynewcurve.h' in the [include/libecc/curves/user_defined/](include/libecc/curves/user_defined/) 517folder, and it will modify some libecc core files to transparently add this curve for the next compilation (modified files 518are [include/libecc/curves/curves_list.h](include/libecc/curves/curves_list.h), [src/tests/ec_self_tests_core.h](src/tests/ec_self_tests_core.h), 519[include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h) and [include/libecc/lib_ecc_types.h](include/libecc/lib_ecc_types.h)). 520 521The test vectors generation can take some time since all the possible triplets (curve, hash function, signature algorithm) are 522processed with the new curve. 523 524After compiling the library, the new curve should show up in the self tests: 525<pre> 526 $ ./build/ec_self_tests 527 ======= Known test vectors test ================= 528 ... 529 [+] ECDSA_SHA224_USER_DEFINED_MYNEWCURVE_0 selftests: known test vectors sig/verif ok 530 ... 531 ======= Random sig/verif test =================== 532 ... 533 [+] ECDSA-SHA224/USER_DEFINED_MYNEWCURVE randtests: random import/export with sig/verif ok 534 ... 535 ======= Performance test ======================== 536 ... 537 [+] ECDSA-SHA224/USER_DEFINED_MYNEWCURVE perf: 269 sign/s and 141 verif/s 538 ... 539</pre> 540 541It should also appear in the `ec_utils` help: 542<pre> 543 $ ./build/ec_utils sign 544 Bad args number for ./build/ec_utils sign: 545 arg1 = curve name: FRP256V1 USER_DEFINED_MYNEWCURVE ... 546 arg2 = signature algorithm type: ECDSA ... 547 arg3 = hash algorithm type: SHA224 ... 548 arg4 = input file to sign 549 arg5 = input file containing the private key (in raw binary format) 550 arg6 = output file containing the signature 551 <arg7 (optional) = ancillary data to be used> 552</pre> 553 554It is possible to remove a user defined curve by using the python script and its name: 555<pre> 556 $ python scripts/expand_libecc.py --remove --name mynewcurve 557 You asked to remove everything related to user defined mynewcurve curve. Enter y to confirm, n to cancel [y/n]. y 558 Removing user defined curve mynewcurve ... 559</pre> 560 561It is also possible to remove **all** the user defined curves at once: 562<pre> 563 $ python scripts/expand_libecc.py --remove-all 564</pre> 565 566Finally, two companion shell scripts are provided along with the expanding python script in order to show its basic usage: 567 568* [scripts/gen_curves_tests.sh](scripts/gen_curves_tests.sh): this script generates the default libecc curves 569with explicit parameters given on the command line. Of course, since these curves are already embedded in 570libecc, there is no real use of generating them - the script is only here to serve as a showcase for expanding 571the library with explicit parameters. 572* [scripts/gen_openssl_curves_tests.sh](scripts/gen_openssl_curves_tests.sh): this script enumerates all OpenSSL 573named curves, generates a DER file with their parameters, and adds them to libecc. 574 575### Adding new hash and signature algorithms 576 577Obviously, adding new algorithms (hash or signature) will require adding new code. 578 579#### Adding new hash functions 580We detail hereafter the necessary steps to add a new hash function. The main file listing all the hash functions is [include/libecc/hash/hash_algs.h](include/libecc/hash/hash_algs.h). The new hash 581algorithm should be added here in compliance with the API described in the `hash_mapping struct`. This API includes: 582 583 * The digest and block sizes and a pretty print name for the algorithm. 584 * `hfunc_init`: the hash function initialization routine. 585 * `hfunc_update`: the hash function update routine. 586 * `hfunc_finalize`: the hash function finalization routine. 587 * `hfunc_scattered`: this function applies the hash function (i.e. compute the digest) on multiple messages 588 (it takes as input an array of pointers to message chunks, and an array of sizes). 589 590These libecc API functions are in fact redirections to the core routines of the hash algorithm, and 591the user is expected to add the specific implementation in '.c' and '.h' files inside the [src/hash/](src/hash/) 592folder. See [src/hash/sha224.c](src/hash/sha224.c) and [include/libecc/hash/sha224.h](include/libecc/hash/sha224.h) for a practical 593example of how to do this with SHA-224. 594 595Finally, the user is expected to update the libecc main configuration file [include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h) 596with the `WITH_MY_NEW_HASH` toggle ('my_new_hash' being the new hash function). 597 598#### Adding new signature algorithms 599In order to add a new elliptic curve based signature algorithm, here is the needed work: 600* The main file listing all the signature algorithms is [include/libecc/sig/sig_algs_internal.h](include/libecc/sig/sig_algs_internal.h). 601The signature algorithm should be added in compliance with the API described in the `ec_sig_mapping struct`. This 602API includes: 603 * The signature type and a pretty print name. 604 * `siglen`: a function giving the length of the produced signature. 605 * `init_pub_key`: a routine producing a public key when given a corresponding private key. 606 * `sign_init`, `sign_update` and `sign_finalize`: the usual functions initializing a signature, updating it with 607 input buffers, and finalizing it to produce an output signature. 608 * `verify_init`, `verify_update` and `verify_finalize`: the usual functions initializing a signature verification, updating 609 it with input buffers, and finalizing it to produce a check status (i.e. signature OK or not OK). 610 611These libecc APIs have to be plugged to the core signature functions, and the user is expected to handle this implementation 612with adding the specific '.c' files inside the [src/sig](src/sig) folder and the specific '.h' files inside the [include/libecc/sig](include/libecc/sig) folder. See [src/sig/ecdsa.c](src/sig/ecdsa.c) and [include/libecc/sig/ecdsa.h](include/libecc/sig/ecdsa.h) for a practical example of how to do this with ECDSA. 613 614Finally, the user is expected to update the libecc main configuration file [include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h) 615with the `WITH_MY_NEW_SIGN_ALG` toggle ('my_new_sign_alg' being the new signature algorithm). 616 617## <a name="performance"></a> Performance 618 619As already stated, libecc has not been designed with performance in mind, but 620with **simplicity** and **portability** as guiding principles; this implies 621several things when it comes to performance: 622 623* libecc does not intend to compete with libraries developed with platform specific accelerations, such as the use of **assembly** 624routines or the adaptation to CPUs quirks at execution time (e.g. a CPU with very slow shift instructions). [OpenSSL](https://www.openssl.org/) 625is an example of such libraries with good and homogeneous performance in mind on most heterogeneous platforms (with the lack of 626portability on very small embedded platforms though). 627* Some algorithmic tricks on specific prime curves are not implemented: the same algorithms are used for all the curves. 628This means for instance that curves using pseudo-Mersenne primes (such as NIST's SECP curves) won't be faster than 629curves using generic random primes (such as Brainpool curves), though pseudo-Mersenne primes can benefit from a 630dedicated reduction algorithm, yielding **orders of magnitude faster field arithmetic** (around five to ten times faster). See 631[here](https://tls.mbed.org/kb/cryptography/elliptic-curve-performance-nist-vs-brainpool) for further discussions on this. 632Consequently, we will only focus on performance comparison with other libraries using the Brainpool curves. 633* We use a very straightforward elliptic curve arithmetic implementation, without using literature generic algorithmic optimizations 634such as [windowing](https://en.wikipedia.org/wiki/Elliptic_curve_point_multiplication#Windowed_method) or 635[fixed-base comb](https://link.springer.com/chapter/10.1007/3-540-45537-X_21) precomputations. 636 637Nonetheless and despite all these elements, **libecc is on par with some other general purpose and portable cryptographic 638libraries** such as [mbedTLS](https://tls.mbed.org) (see the performance figures given below). 639 640We present hereafter the ECDSA performance comparison of libecc with mbedTLS and OpenSSL on various platforms representing 641different CPU flavours. Here are some information about the tested version when not stated otherwise: 642 643* mbedTLS: stable version 2.4.2, the figures have been gathered with the builtin benchmark. 644* OpenSSL: debian packaged version 1.1.0e. Since OpenSSL builtin ECDSA benchmark does not handle Brainpool curves, 645a basic C code using "named curves" have been compiled against the installed dynamic library. 646 647### Performance oriented platforms 648 649* **Core i7-5500U** (Broadwell family) is a typical x86 mid-range current laptop CPU. 650* **Xeon E3-1535M** (Skylake family) is a typical x86 high-end CPU. 651* **Power-7** is a typical server CPU of the previous generation (2010) with 652a PowerPC architecture. 653 654For all the platforms in this subsection, the CPUs have been tested in 64-bit mode. 655 656 657| **libecc** | Core i7-5500U @ 2.40GHz | Xeon E3-1535M v5 @ 2.90GHz | Power-7 | 658|-----------------|:----------------------------|:------------------------------|:--------------------------| 659| BP256R1 | 583 sign/s - 300 verif/s | 700 sign/s - 355 verif/s | 213 sign/s - 110 verif/s | 660| BP384R1 | 231 sign/s - 118 verif/s | 283 sign/s - 150 verif/s | 98 sign/s - 50 verif/s | 661| BP512R1 | 111 sign/s - 56 verif/s | 133 sign/s - 68 verif/s | 51 sign/s - 26 verif/s | 662 663| **mbedTLS** | Core i7-5500U @ 2.40GHz | Xeon E3-1535M v5 @ 2.90GHz | Power-7 | 664|-----------------|:----------------------------|:------------------------------|:--------------------------| 665| BP256R1 | 426 sign/s - 106 verif/s | 552 sign/s - 141 verif/s | 178 sign/s - 45 verif/s | 666| BP384R1 | 239 sign/s - 56 verif/s | 322 sign/s - 77 verif/s | 44 sign/s - 23 verif/s | 667| BP512R1 | 101 sign/s - 26 verif/s | 155 sign/s - 34 verif/s | 38 sign/s - 12 verif/s | 668 669| **OpenSSL** | Core i7-5500U @ 2.40GHz | Xeon E3-1535M v5 @ 2.90GHz | Power-7 | 670|-----------------|:----------------------------|:------------------------------|:--------------------------| 671| BP256R1 | 2463 sign/s - 1757 verif/s | 2873 sign/s - 2551 verif/s | 1879 sign/s - 1655 verif/s| 672| BP384R1 | 1091 sign/s - 966 verif/s | 1481 sign/s - 1265 verif/s | 792 sign/s - 704 verif/s| 673| BP512R1 | 727 sign/s - 643 verif/s | 1029 sign/s - 892 verif/s | 574 sign/s - 520 verif/s| 674 675### Embedded platforms with moderate constraints 676* **Marvel Armada A388** is a good representative of moderately constrained embedded devices, such as 677IAD (Internet Access Devices), NAS (Network Attached Storage), STB (Set Top Boxes) and smartphones. 678This SoC is built around a Cortex-A9 ARMv7-A 32-bit architecture. 679* **BCM2837** is a Broadcom SoC built around the recent 64-bit ARMv8-A architecture, with a 680Cortex-A53 core. This SoC can be found in the Raspberry Pi 3, and also represents what can 681be found in recent Smartphones. 682* **Atom D2700** is a small x86 CPU typically embedded in NAS devices. Though its "embedded" 683coloration, it uses a 64-bit mode that we have tested here. 684 685| **libecc** | Marvell A388 @ 1.6GHz | BCM2837 (aarch64) @ 1.2GHz | Atom D2700 @ 2.13GHz | 686|-----------------|:----------------------|----------------------------|:-----------------------| 687| BP256R1 | 64 sign/s - 33 verif/s| 43 sign/s - 22 verif/s | 68 sign/s - 35 verif/s | 688| BP384R1 | 24 sign/s - 12 verif/s| 17 sign/s - 9 verif/s | 25 sign/s - 13 verif/s | 689| BP512R1 | 11 sign/s - 5 verif/s | 8 sign/s - 4 verif/s | 12 sign/s - 6 verif/s | 690 691| **mbedTLS** | Marvell A388 @ 1.6GHz | BCM2837 (aarch64) @ 1.2GHz | Atom D2700 @ 2.13GHz -| 692|-----------------|:----------------------|----------------------------|:------------------------| 693| BP256R1 | 33 sign/s - 8 verif/s | 14 sign/s - 4 verif/s | 87 sign/s - 22 verif/s| 694| BP384R1 | 20 sign/s - 4 verif/s | 8 sign/s - 2 verif/s | 50 sign/s - 11 verif/s| 695| BP512R1 | 10 sign/s - 2 verif/s | 4 sign/s - 1 verif/s | 23 sign/s - 5 verif/s | 696 697| **OpenSSL** | Marvell A388 @ 1.6GHz | BCM2837 (aarch64) @ 1.2GHz | Atom D2700 @ 2.13GHz | 698|-----------------|:------------------------|----------------------------|:------------------------| 699| BP256R1 | 369 sign/s - 332 verif/s| 124 sign/s - 112 verif/s | 372 sign/s - 334 verif/s| 700| BP384R1 | 102 sign/s - 94 verif/s | 54 sign/s - 49 verif/s | 163 sign/s - 149 verif/s| 701| BP512R1 | 87 sign/s - 81 verif/s | 31 sign/s - 29 verif/s | 92 sign/s - 83 verif/s | 702 703 704### <a name="constrained-devices"></a> Very constrained embedded devices 705The library, when configured for a 256-bit curve (SECP256R1, FRP256), SHA-256 and ECDSA signature fits in around 706**30 Kilo Bytes of flash/EEPROM**, and uses around **8 Kilo Bytes of RAM** (stack) with variations depending on the 707chosen WORDSIZE (16, 32, 64), the compilation options (optimization for space `-Os` or speed `-O3`) and the 708target (depending on the instructions encoding, produced binary code can be more or less compact). 709A 521-bit curve with SHA-256 hash function and ECDSA signature should fit in 38 Kilo Bytes of flash and around 71016 Kilo Bytes of RAM (stack), with the same variations depending on the WORDSIZE and the compilation options. 711 712**Note**: libecc does not use any heap allocation, and the only global variables used are the **constant ones**. The 713constant data should end up in the flash/EEPROM section with a read only access to them: no RAM memory should 714be consumed by these. The libecc read/write data are only made of local variables on the stack. Hence, RAM 715consumption (essentially made of arrays representing internal objects such as numbers, point on curves ...) 716should be reasonably constant across platforms. **However**, some platforms using the 717**[Harvard architecture](https://en.wikipedia.org/wiki/Harvard_architecture)** (as opposed to Von Neumann's one) 718can have big limitations when accessing so called "program memory" as data. The 8-bit 719[Atmel AVR](http://www.atmel.com/products/microcontrollers/avr/) MCU 720is such an example. Compilers and toolchains for such architectures usually copy read only data in RAM at run time, 721and/or provide [non-standard ways](http://www.atmel.com/webdoc/avrlibcreferencemanual/pgmspace_1pgmspace_strings.html) 722to access read only data in flash/EEPROM program memory (through specific macros, pragmas, functions). The 723first case means that the RAM consumption will increase for libecc compared to the stack only usage (because of 724the runtime copy). The second case means that libecc code will have to be **adapted** to the platform if the user 725want to keep RAM usage at its lowest. In any case, tracking where `const` qualified data reside will be important 726when the amount of RAM is a critical matter. 727 728A full software stack containing a known test vector scenario has been compiled and tested on a **Cortex-M0** 729([STM32F030R8T6](http://www.st.com/en/microcontrollers/stm32f030r8.html) @ 48MHz with 64KB of flash and 8KB of RAM). 730It has also been compiled and tested on a **Cortex-M3** ([STM32F103C8T6](http://www.st.com/en/microcontrollers/stm32f103c8.html) 731@ 72MHz with 64KB of flash and 20KB of RAM). The results of the flash/RAM occupancy are given in the table below, 732as well as the timings of the ECDSA signature and verification operations. 733 734**Note**: The Cortex-M0 case is a bit special in the ARM family. Since this MCU lacks a 32-bit x 32-bit to 64-bit 735multiplication instruction, the multiplication is implemented using a builtin software function. This yields 736in poor performance with WORDSIZE=64 compared to WORDSIZE=32 (this might be explained by the calling cost to 737the builtin function). 738 739 740| **libecc** | STM32F103C8T6 (Cortex-M3 @ 72MHz) | STM32F030R8T6 (Cortex-M0 @ 48MHz) | 741|-----------------|:----------------------------------|:----------------------------------| 742| Flash size | 32KB | 30KB | 743| RAM size | 8KB | 8KB | 744| Sign time | 950ms | 2146ms | 745| Verif time | 1850ms | 4182ms | 746 747In order to compare the libecc performance on these embedded platforms, we give figures for mbedTLS on 748Cortex-M3 taken from a [recent study by ARM](http://csrc.nist.gov/groups/ST/lwc-workshop2015/presentations/session7-vincent.pdf). 749As we have previously discussed, only the figures without NIST curves specific optimizations are of interest 750for a fair comparison: 751 752| **mbedTLS** | LPC1768 (Cortex-M3 @ 92MHz)<sup>1</sup> | 753|-----------------|:------------------------------| 754| Flash size | ?? | 755| RAM size | 3KB<sup>2</sup>| 756| Sign time | 1893ms | 757| Verif time | 3788ms | 758 759<sup>1</sup> Beware of the MCU frequency difference when comparing with libecc test case. 760 761<sup>2</sup> This figure only includes heap usage (stack usage is unknown so this is only a 762rough lower limit for RAM usage). 763 764 765## <a name="compatibility-and-portability"></a> Compatibility and Portability 766 767### libecc compatibility 768 769When dealing with the **portability** of a program across various platforms, many issues are 770in fact hidden behind this property. This is due to the very complex nature of what a 771**platform** is, namely: 772 773* A **core CPU** architecture (x86, ARM, MIPS, PowerPC, ...). 774* A target **OS** (Linux, Windows, Mac OS, ...) or more low level firmware (including a **bare-metal** 775programming model or exotic real-time OS for microcontrollers for instance). 776* A proper compilation **(cross-)toolchain** producing binaries for the platform. This toolchain will usually 777include a compiler and a linker, both with possibly specific flags and limitations. 778 779Regarding libecc, here are the main elements to be aware of when dealing with a "new" platform: 780 781* libecc is in pure C-99 (no assembly), so it should compile on **any platform** with a decent C-99 782compatible compiler. The code is **endian neutral**, meaning that libecc should work on little endian 783and big endian platforms. 784* The Makefile has been tested with clang and gcc under Linux, as well as gcc cross-compilation variants 785such as **mingw** for Windows or gcc **Mac OS** version. In order to adapt the makefile behaviour when the 786compiler is not gcc/clang compatible, the user can modify the CFLAGS as well as the LDFLAGS by exporting them. 787* The library supports 16-bit/32-bit/64-bit word sizes, which should ensure compatibility with most of the platforms 788for 8-bit MCUs to 64-bit CPUs. If the toolchain does not have a [`stdint.h`](http://pubs.opengroup.org/onlinepubs/009695399/basedefs/stdint.h.html) 789header, it is still possible to compile libecc by exporting LIBECC_NOSTDLIB=1: in this case, the code will try to 790guess and fit to native C types or throw an error so that the user can adapt [src/words/types.h](src/words/types.h) to its specific case. 791* The library core is platform independent. However, when the platform is not recognized (i.e. everything aside UNIX/Windows/Mac OS), 792an error is thrown at compilation time asking the user to provide implementations for **external dependencies** 793in [src/external_deps/](src/external_deps), namely: 794 * The printing helper in [src/external_deps/print.c](src/external_deps/print.c). This helper serves output debugging purposes. 795 * The timing helper in [src/external_deps/time.c](src/external_deps/time.c). This helper is used to measure performances of the 796 library in the performance self tests. 797 * The random helper in [src/external_deps/rand.c](src/external_deps/rand.c). This helper is used in the core library for the signature 798 schemes. One should notice that a **good random source** is **crucial** for the security of Elliptic Curve based signature schemes, 799 so great care must be taken when implementing this. 800 801Some other external dependencies could arise depending on the compilation chain and/or the platform. Such an example is the 802implementation of the gcc and clang stack protection option, usually expecting the user to provide stack canaries generation 803(with random values) and failover behavior. 804 805 806### <a name="compiling-libecc-for-arm-cortex-m-with-GNU-gcc-arm"></a> Compiling libecc for ARM Cortex-M with GNU gcc-arm 807 808Compiling for Cortex-M targets should be straightforward using the arm-gcc none-eabi (for bare metal) cross-compiler as 809well as the specific Cortex-M target platform SDK. In order to compile the core libsign.a static library, the only thing to do is to execute 810the makefile command by overloading `CROSS_COMPILE`, `CC` and the `CFLAGS`: 811<pre> 812 $ CROSS_COMPILE=arm-none-eabi- CC=gcc CFLAGS="$(TARGET_OPTS) -W -Wextra -Wall -Wunreachable-code \ 813 -pedantic -fno-builtin -std=c99 -Os \ 814 -ffreestanding -fno-builtin -nostdlib -DWORDSIZE=64" \ 815 make build/libsign.a 816</pre> 817 818where `$(TARGET_OPTS)` are the flags specific to the considered target: `-mcpu=cortex-m3 -mthumb` for Cortex-M3 for example. The word size 819flag should be adapted to `-DWORDSIZE=32` for the specific case of Cortex-M0/M0+ as discussed in the [performance section](#performance) 820(because of the lacking of 32-bit to 64-bit native multiplication instruction). The library can then be used to be linked against a file 821containing the `main` calling function, and the linking part will depend on the 822target platform (in addition to the target CPU): one will use the **linker scripts** provided by the platform/board manufacturer to produce 823a firmware suitable for the target (ST for STM32, NXP for LPC, Atmel for SAM, ...). 824 825If the external dependencies have been implemented by the user, it is also possible to build a self-tests binary by adding the 826GNU ld linker script specific to the target platform (`linker_script.ld` in the example below): 827<pre> 828 $ CROSS_COMPILE=arm-none-eabi- CFLAGS="$(TARGET_OPTS) -W -Wextra -Wall -Wunreachable-code \ 829 -pedantic -fno-builtin -std=c99 -Os \ 830 -ffreestanding -fno-builtin -nostdlib -DWORDSIZE=64" \ 831 LDFLAGS="-T linker_script.ld" \ 832 make build/libsign.a 833</pre> 834 835**NOTE1**: By default, the linker scripts share the RAM between heap and stack. Since libecc only uses stack, it is convenient 836(sometimes necessary, specifically on devices with very constrained RAM, such as Cortex-M0 with 8KB) to adapt the **stack base address** 837so that no stack overflow errors occur. These errors can be tricky to detect since they generally produce hard faults silently at 838run time. Also, a `SMALLSTACK=1` compilation toggle allows to limit stack consumption further: you can use it carefully if your device 839does not have enough stack for the regular compilation options (use with care as some side channels countermeasures are deactivated, and this 840mode is not compatible with the EdDSA signature and X25519 ECDH algorithm). 841 842**NOTE2**: It is up to the user to link against the libc (if standard functions are necessary) or not, but this will obviously influence the 843program size in flash. As already stated, the libc footprint is not included in the figured that have been given in 844the [performance section](#performance). 845 846**NOTE3**: libecc has also been successfully tested with other non-GNU compilation SDK and toolchains such as [Keil MDK](http://www.keil.com/) 847configured to use the [ARM compiler](http://www2.keil.com/mdk5/compiler/5/). 848 849### <a name="libecc-portability-guide"></a> libecc portability guide 850 851This section is dedicated to giving some more details on how to compile libecc when non-GNU compilers 852are used (i.e. C compilers that do not support gcc syntax), and/or when compiling with environments that 853do not provide a **GNU make** compilation style (this is generally the case for all-in-one IDEs such as 854Visual Studio or other BSP and SDK provided by proprietary integrated circuits founders and board manufacturers). 855 856#### 1 - Compilers and C99 standard compliance 857 858As we have already stated, libecc requires a C99 compiler. More specifically, libecc makes use of 859only four feature of the C99 standard (over the older C89/C90 standard), namely: 860* The `long long int` type. 861* Designated initializers for structures. 862* The usage of the `inline` keyword. 863* The usage of variadic macros. 864 865Hence, when compiling with a given compiler, one will have to check that the compiler is 866**either fully C99 compliant**, or that these four features are at least **implemented as extensions**. 867Such details are generally provided by the compiler documentation. 868 869**NOTE**: if one wants to adapt libecc for compilers where some of the necessary C99 features are missing, here is a 870big picture of the necessary work: 871* The `long long int` and structures initializers are used all over libecc code, so they are 872**strong requirements**, and would imply deep code modifications. 873* The `inline` keyword can be removed in most cases, except in the context of header files where it is used 874to define `static inline` functions. These functions will have to be moved to '.c' files, and one will have to 875deal with minor adaptations. 876* The usage of variadic macros is marginal and can be removed with minimal efforts: these are only used 877to deal with debug helpers in [src/utils](src/utils). 878 879#### 2 - Compiling with environments without GNU make 880 881libecc uses a GNU style [Makefile](Makefile) to automate the compilation process. One can however use other 882compilation environments that are not GNU make compatible by implementing the following guidelines: 883* Make the compilation toolchain compile into **'.o' objects** all the necessary '.c' files in [src/nn](src/nn), 884[src/fp](src/fp), [src/curve](src/curve), [src/sig](src/sig), [src/utils](src/utils) and [src/hash](src/hash). 885* Make the compilation toolchain **link** the necessary object files to generate the static libraries: 886<pre> 887 libarith.a: 888 °°°°°°°°°°° 889 src/fp/fp_rand.o src/fp/fp_mul.o src/fp/fp_montgomery.o src/fp/fp_mul_redc1.o src/fp/fp_add.o src/fp/fp.o 890 src/fp/fp_pow.o src/nn/nn_mul.o src/nn/nn_mul_redc1.o src/nn/nn_logical.o src/nn/nn.o src/nn/nn_modinv.o 891 src/nn/nn_add.o src/nn/nn_rand.o src/nn/nn_div.o src/utils/print_nn.o src/utils/print_fp.o src/utils/print_keys.o 892 src/utils/print_curves.o src/utils/utils.o 893</pre> 894<pre> 895 libec.a: 896 °°°°°°°° 897 src/fp/fp_rand.o src/fp/fp_mul.o src/fp/fp_montgomery.o src/fp/fp_mul_redc1.o src/fp/fp_add.o src/fp/fp.o src/fp/fp_pow.o 898 src/nn/nn_mul.o src/nn/nn_mul_redc1.o src/nn/nn_logical.o src/nn/nn.o src/nn/nn_modinv.o src/nn/nn_add.o src/nn/nn_rand.o 899 src/nn/nn_div.o src/utils/print_nn.o src/utils/print_fp.o src/utils/print_keys.o src/utils/print_curves.o src/utils/utils.o 900 src/curves/prj_pt.o src/curves/curves.o src/curves/aff_pt.o src/curves/prj_pt_monty.o src/curves/ec_shortw.o src/curves/ec_params.o 901</pre> 902<pre> 903 libsign.a: 904 °°°°°°°°°° 905 src/fp/fp_rand.o src/fp/fp_mul.o src/fp/fp_montgomery.o src/fp/fp_mul_redc1.o src/fp/fp_add.o src/fp/fp.o src/fp/fp_pow.o 906 src/nn/nn_mul.o src/nn/nn_mul_redc1.o src/nn/nn_logical.o src/nn/nn.o src/nn/nn_modinv.o src/nn/nn_add.o src/nn/nn_rand.o 907 src/nn/nn_div.o src/utils/print_nn.o src/utils/print_fp.o src/utils/print_keys.o src/utils/print_curves.o src/utils/utils.o 908 src/curves/prj_pt.o src/curves/curves.o src/curves/aff_pt.o src/curves/prj_pt_monty.o src/curves/ec_shortw.o src/curves/ec_params.o 909 src/hash/sha384.o src/hash/sha3-512.o src/hash/sha512.o src/hash/sha3-256.o src/hash/sha3-224.o src/hash/sha3.o src/hash/sha256.o 910 src/hash/sha3-384.o src/hash/sha224.o src/hash/hash_algs.o src/sig/ecsdsa.o src/sig/ecdsa.o src/sig/ecrdsa.o src/sig/ecosdsa.o 911 src/sig/ecfsdsa.o src/sig/eckcdsa.o src/sig/ecgdsa.o src/sig/ecsdsa_common.o src/sig/sig_algs.o src/sig/ec_key.o 912</pre> 913 914Compiling binaries (such as `ec_self_tests` and `ec_utils`) is nothing more than compiling concerned '.c' files under [src/tests](src/tests) 915and linking them with `libsign.a`. 916 917#### 3 - Dealing with the standard library and stdint 918 919Some important **preprocessor flags** are expected to be defined when compiling libecc: 920* `WORDSIZE=`: this is a preprocessor flag defining libecc internal words size (16, 32, or 64). By default libecc will 921detect the best size depending on the platform, but if the platform is not recognized the user is expected to 922provide this flag. 923* `WITH_STDLIB`: this flag is used for standard library usage inside libecc. Exporting the environment variable 924`LIBECC_NOSTDLIB=1` will trigger the **non usage** of standard includes and libraries. Standard C library headers and files 925are used for two things in the project: 926 * Defining standard types through the `stdint.h` header. 927Though using this header helps libecc to properly define basic types in [include/libecc/words/types.h](include/libecc/words/types.h), it is not 928required to use it and some heuristics can be used to define these types without standard headers (see explanations on that 929in [include/libecc/words/types.h](include/libecc/words/types.h)) comments. 930 * Defining standard library functions used by external dependencies as well as `ec_utils`. Compiling without `WITH_STDLIB` 931flag means that one has to provide these. 932 933In any case, if the user forgot to provide important preprocessing flags whenever they are necessary, **errors will be thrown** during 934the compilation process. As explained in [include/libecc/words/types.h](include/libecc/words/types.h), when `stdint.h` is not used (i.e. `WITH_STDLIB` 935not defined), heuristics are used to guess primitive types sizes. These heuristics can fail and the user will have to adapt the types 936definitions accordingly depending on the platform. 937 938#### <a name="overloading-makefile-variables"></a> 4 - Overloading Makefile variables 939 940When compiling using compilers that are not compatible with the gcc syntax, but still using a GNU make 941compilation environment, it is possible to **adpat the Makefile behavior**. In addition to the `LIBECC_NOSTDLIB=1` 942environment variable previously described, here is the list of the variables that tune the compilation process: 943 944* `CC`: as usual, this overloads the compiler to be used. 945* `CFLAGS` and `LDFLAGS`: these flags can be overloaded by user defined ones. The user defined flags will completely 946shadow the default flags for both the static libraries (libarith.a, libec.a, libsign.a) and the produced binaries. 947* `LIB_CFLAGS`, `BIN_CFLAGS`, `BIN_LDFLAGS`: when one wants to specifically tune compilation and linking flags for 948the static libraries and the binaries, these flags can be used and they will shadow the `CFLAGS` and `LDFLAGS`. 949* `AR` and `RANLIB`: these flags override the ar and ranlib tools used to generate the static library archives. 950 951As a simple example of when and how to use this environment variables overloading system, let's take the following case: 952one wants to compile libecc with an old version of gcc that does not support the `-fstack-protector-strong` option 953(this is the case for [gcc < 4.9](https://lwn.net/Articles/584225/)). Since this is the flag used by default in 954libecc Makefile, an error will be triggered. It is possible to overcome this issue by overloading the `CFLAGS` with 955the following: 956<pre> 957 $ CFLAGS="-W -Werror -Wextra -Wall -Wunreachable-code -pedantic -fno-builtin -std=c99 -D_FORTIFY_SOURCE=2 \ 958 -fstack-protector-all -O3 -DWITH_STDLIB -fPIC" make 959</pre> 960 961As we can see, we keep the other `CFLAGS` from default compilation while replacing `-fstack-protector-strong` with 962the **less efficient but more compatible** `-fstack-protector-all`. 963 964In addition to compilation flags, it is also possible to overload the library **word sizes** as well as **debug** 965modes through Makefile targets: 966* `make debug` will compile a debug version of the library and binaries, with debugging symbols. 967Setting the environment variable `VERBOSE_INNER_VALUES=1` will print out more values. 968* `make 16`, `make 32` and `make 64` will respectively compile the library with 16, 32 and 64 bits word sizes. `make debug16`, 969`make debug32` and `make debug64` will compile the debug versions of these. 970* `make force_arch32` and `make force_arch64` will force 32-bit and 64-bit architectures compilation (`-m32` and `-m64` 971flags under gcc). These targets allow cross-compilation for a 32-bit (respectively 64-bit) target under a 64-bit (respectively 97232-bit) host: a typical example is compiling for i386 under x86\_64. 973 974**NOTE**: the targets that we have described here can be used in conjunction with overloading the `CFLAGS` and `LDFLAGS`. Hence, 975a: `CFLAGS="-fstack-protector-all" make debug16` 976will indeed compile all the binaries for debug, with a word size of 16 bits and a `-fstack-protector-all` stack protection option. 977 978 979#### 5 - A concrete example with SDCC 980 981As an example to show how to adapt the compilation process to compilers that are not compatible with the 982GNU compilers syntax, we will detail how to proceed by exploring the [SDCC](http://sdcc.sourceforge.net/) 983(Small Device C Compiler) toolchain. Porting libecc to this compiler is interesting for many reasons: 984 985* The SDCC compiler uses some specific syntax, though it shares some similarities with 986other compilers (`-c` flag to generate object files, `-o` flag to define output file). 987* This compiler is "almost" C99 compliant: depending on the target, it has some C99 features 988[partially implemented](http://sdcc.sourceforge.net/mediawiki/index.php/Standard_compliance). 989* The compiler has "exotic" targets such as the Zilog Z80 MCU. 990 991We suppose that the user has also provided the **external dependencies** for print, random and time 992functions (otherwise explicit errors will be thrown by #error directives). 993 994We will show how overloading the Makefile flags can be of use in this case. Say that we want 995to compile libecc in order to embed it in a Game Boy ROM. The Game Boy console uses a proprietary 996version of the Z80 MCU supported by SDCC under the target name `gbz80`. 997 998Hence, a first attempt at compilation would be to: 999* Overload `CC=sdcc` to change the default compiler. 1000* Overload `AR=sdar` and `RANLIB=sdranlib` to overload the archives handling binaries (they are specific 1001to SDCC). 1002* Overload `CFLAGS="-mbgz80 --std-sdcc99"` to specify the target, and ask for the C99 compatibility mode. 1003* Overload `LDFLAGS=" "` with nothing since we do not want default gcc linking flags to break compilation. 1004 1005This first attempt will trigger an error: 1006<pre> 1007 $ CC=sdcc AR=sdar RANLIB=sdranlib CFLAGS="-mgbz80 --std-sdcc99" LDFLAGS=" " make 1008 ... 1009 src/external_deps/../words/words.h:62:2: error: #error "Unrecognized platform. \ 1010 Please specify the word size of your target (with make 16, make 32, make 64)" 1011</pre> 1012 1013As we have explained, when the platform is not recognized one has to specify the word size. We will 1014do it by overloading `WORDSIZE=16`: the Z80 is an 8-bit CPU, so it seems reasonable to fit the word 1015size to 16-bit (8-bit half words). The second attempt will go further but will fail at some point when 1016trying to compile the final binaries: 1017<pre> 1018 $ CC=sdcc AR=sdar RANLIB=sdranlib CFLAGS="-mgbz80 --std-sdcc99 -DWORDSIZE=16" LDFLAGS=" " make 1019 ... 1020 at 1: error 119: don't know what to do with file 'src/tests/ec_self_tests_core.o'. file extension unsupported 1021</pre> 1022 1023However, one can notice that the static libraries and some object files have been compiled, which is a 1024first step! Compiling a full binary is a bit technical due to the fact that SDCC does not know how 1025to deal with '.o' object files and '.a' archives. However, we can find our way out of this by renaming 1026the 'libsign.a' to 'libsign.lib', and adding missing objects in the library. Compiling the `ec_self_tests` 1027binary needs external dependencies ([src/external_deps/print.c](src/external_deps/print.c), 1028[src/external_deps/rand.c](src/external_deps/rand.c) and [src/external_deps/time.c](src/external_deps/time.c)) 1029as well as the two '.c' files [src/tests/ec_self_tests_core.c](src/tests/ec_self_tests_core.c) and 1030[src/tests/ec_self_tests.c](src/tests/ec_self_tests.c), the latter being the one containing the `main` 1031function. So we will first add the necessary objects files in the existing library with `sdar`: 1032<pre> 1033 $ cp build/libsign.a build/libsign.lib 1034 $ sdar q build/libsign.lib src/external_deps/print.o src/external_deps/rand.o src/external_deps/time.o src/tests/ec_self_tests_core.o 1035</pre> 1036 1037Then, we compile and link [src/tests/ec_self_tests.c](src/tests/ec_self_tests.c) with the library: 1038<pre> 1039 $ sdcc -mgbz80 -DWORDSIZE=16 --std-sdcc99 src/tests/ec_self_tests.c build/libsign.lib 1040</pre> 1041 1042This should create a `ec_self_tests.ihx`, which has an [Intel HEX](https://fr.wikipedia.org/wiki/HEX_(Intel)) 1043file format for firmware programming. From this file, it is usually straightforward to create a Game Boy ROM file 1044that can be interpreted by an [emulator](http://m.peponas.free.fr/gngb/) (there are however some quirks related 1045to the Game Boy platform hardware architecture, see the note below). 1046 1047**NOTE**: the purpose of the section was to show how to adapt the compilation process to compilers non 1048compatible with the GNU C one. Consequently, fully porting libecc to the Game Boy platform is left as 1049a complementary work, and this is not a "so easy" task. Among other things, one will have to deal with 1050the ROM size limitation of 32KB that can be solved using [bank switching](http://gbdev.gg8.se/wiki/articles/Memory_Bank_Controllers), 1051which will involve some code and compilation tuning. Another issue would be the RAM size of 8KB and 1052properly handling the stack pointer base as described in the [previous sections](#compiling-libecc-for-arm-cortex-m-with-GNU-gcc-arm). 1053 1054## libecc, side channel attacks and constant time 1055 1056### Constant time 1057 1058Though **some efforts** have been made to have (most of) the core algorithms 1059constant time, turning libecc into a library shielded against side channel attacks 1060is still a **work in progress**. 1061 1062Beyond pure algorithmic considerations, many aspects of a program can turn 1063secret leakage resistance into a very complex problem, especially when writing 1064portable C code. Among other things, we can list the following: 1065 1066* Low level issues can arise when dealing with heterogeneous platforms (some 1067instructions might not be constant time) and compilers optimizations 1068(a C code that seems constant time is in fact compiled to a non constant time assembly). 1069* Any shared hardware resource can become a leakage source (the caches, the 1070branch prediction unit, ...). When dealing with a portable source code 1071meant to run on most platforms, it is not an easy task to think of all these 1072leakage sources. 1073 1074For a thorough discussion about cryptography and constant time challenges, 1075one can check [this page](https://bearssl.org/constanttime.html). 1076 1077### Signature algorithm blinding 1078 1079In order to avoid a range of attacks on the signature algorithm exploiting various 1080side channel attacks and leading to the recovery of the secret key 1081(see [here](https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/2018/rohnp-return-of-the-hidden-number-problem.pdf) 1082for more details), **blinding** operations can be used. 1083 1084Since such security countermeasures have a **significant performance hit** on the signature algorithm, we have 1085decided to leave the activation of such countermeasures as a **voluntary decision** to the end user. 1086The performance impact might be acceptable or not depending on the context where the signature is performed, and whether attackers exploiting side channels 1087are indeed considered in the threat model of the specific use case. 1088Of course, for **security critical use cases we recommend the blinding usage 1089despite its performance cost**. 1090 1091Compiling the library with blinding is as simple as using the ``BLINDIG=1`` environment variable (or the ``-DUSE_SIG_BLINDING`` C flag): 1092 1093<pre> 1094 $ BLINDING=1 make 1095</pre> 1096 1097**NOTE**: if you are **unsure** about your current security context, use the ``BLINDING=1`` by default! 1098 1099 1100### Overview of SCA (Side Channel Attacks) countermeasures 1101 1102All in all, libecc has now the following approaches to limit SCA: 1103 1104* SPA (Simple Power Analysis) is thwarted using Montgomery Ladder (or Double and Add Always optionally using the ``ADALWAYS=1`` switch), plus complete formulas 1105(see [here](https://joostrenes.nl/publications/complete.pdf)) to avoid leaking point at infinity (by avoiding exceptions). Constant time 1106operations are (tentatively) used to limit leakage of different operations, 1107even though this task is very complex to achieve (especially in pure C). See 1108the discussion above. 1109* DDPA (Data DPA) is thwarted using blinding of the point (projective 1110coordinates) and of the scalar (with adding a random multiple of the 1111curve order with maximum entropy). Because of its major impact on 1112performance, blinding must be specifically turned on by the used using the 1113``BLINDING=1`` switch, see the discussion above. 1114* ADPA (Address-bit DPA) is limited using Itoh et al. Double and Add Always 1115masked variant. See the article "A Practical Countermeasure against 1116Address-Bit Differential Power Analysis" by Itoh, Izu and Takenaka for more information. 1117 1118All these countermeasures must, of course, be validated on the specific target 1119where the library runs with leakage assessments. Because of the very nature of 1120C code and CPU microarchitectural details, it is very complex without such a leakage 1121assessment (that again depends on the target) to be sure that SCA protection 1122is indeed efficient. 1123 1124### libecc against FIA (Fault Injection Attacks) 1125 1126Efforts made to render libecc robust against FIA are a **work in progress**, and 1127will require **substantial additions**. As for SCA robustness, many elements 1128might depend on the low-level compilation process and are difficult to handle 1129at high-level in pure C. 1130 1131For now, we check if points are on the curve when entering and leaving the 1132scalar multiplication algorithm, as well as when importing external public points. 1133Efforts are also made to sanity check the signature and verification contexts whenever possible, 1134as well as all the intermediate contexts (natural numbers, fields, hash functions, etc.). 1135 1136Currently, no specific effort has been made to render conditional operations robust 1137(e.g. using double if and limiting compilation optimization). 1138 1139 1140## Software architecture 1141 1142The public header of the libecc API are in the [include/libecc/](include/libecc/) 1143folder. Then, the source code is composed of eight main parts that consist of the 1144**core source code**: 1145 1146 * [1] Machine code: in [src/words](src/words/) 1147 1148 >Abstraction layer to handle word size depending 1149 >on the target machine (the word size can also be forced during 1150 >compilation). Some useful low level macros and functions are 1151 >handled there. 1152 1153 * [2] Natural Numbers layer: in [src/nn](src/nn/) 1154 1155 >This part implements all the functions 1156 >related to positive integers arithmetic (including modular 1157 >arithmetic). 1158 1159 * [3] Fp layer: in [src/fp](src/fp/) 1160 1161 >Finite field of prime order (binary fields are 1162 >intentionally not supported). 1163 1164 * [4] Elliptic curves core: in [src/curves](src/curves/) 1165 1166 >This layer implements all the primitives 1167 >handling elliptic curves over prime fields, including point 1168 >addition and doubling, affine and projective coordinates, ... 1169 1170 * [5] Curves definitions: in [include/libecc/curves/known](include/libecc/curves/known) and 1171 [include/libecc/curves/user_defined](include/libecc/curves/user_defined) 1172 1173 >These are the definitions of some standard curves (SECP, Brainpool, 1174 >FRP, ...). 1175 1176 * [6] EC\*DSA signature algorithms: in [src/sig](src/sig/) 1177 1178 >This layer implements the main 1179 >elliptic curves based signature algorithms (ECSDSA, ECKCDSA, 1180 >ECFSDSA, ECGDSA, ECRDSA, ECOSDSA). It exposes a sign and 1181 >verify API with the standard Init/Update/Final logic. 1182 1183 * [7] Hash functions: in [src/hash](src/hash/) 1184 1185 >Hash functions (SHA-2 and SHA-3 based algorithms 1186 >for now). 1187 1188 * [8] Utils: in [src/utils](src/utils/) 1189 1190 >Various useful libc functions (memcpy, memset, ...) as well as 1191 >well as pretty printing functions for our NN, Fp and curves layers. 1192 1193In addition to the core source code of the library, various resources 1194are also present in the source tree. We describe them hereafter. 1195 1196Some self tests are provided for the signature algorithms over all the curves 1197and using all the hash functions [9], as well as tests targeting arithmetic 1198operations over NN and Fp more specifically [10]: 1199 1200 * [9] Sig self tests: in [src/tests](src/tests/) 1201 1202 >Functions to test that the compiled library is 1203 >properly working with regard to the signature algorithms over 1204 >the curves statically defined in the library. 1205 >These tests consiste in known test vectors, random test 1206 >vectors (i.e. random data sign/verify) as well as performance measurements. 1207 1208 * [10] Arithmetic self tests: in [src/arithmetic](src/arithmetic_tests/) 1209 1210 >Functions to test that the compiled arithmetic library is 1211 >properly working in its basic operations (addition, subtraction, 1212 >multiplication, ...). 1213 1214Some examples to help the user interact with the NN, Fp and cruves layers 1215are also provided: 1216 1217 * [11] User examples: in [src/examples](src/examples/) 1218 1219 >User examples for each of the NN, Fp and curves layers. These 1220 >examples show what are headers to use, and how to interact with 1221 >the abstract mathematical objects of each layer. Other examples beyond 1222 >the basic ones (such as RSA signatures, SSS, etc.) are also present there. 1223 1224The configuration of the library [13] as well as an external dependencies 1225abstraction layer are also provided: 1226 1227 * [12] External dependencies: in [src/external_deps](src/external_deps/) 1228 1229 >These files contain the functions that 1230 >are considered as external dependencies, meaning that their 1231 >implementation is platform dependent (this concerns debug 1232 >output on a console or file, random generation, time measurement). 1233 >If no C standard library is provided, the user must implement 1234 >those functions. 1235 1236 * [13] Configuration files: in [include/libecc/lib_ecc_config.h](include/libecc/lib_ecc_config.h) 1237 1238 >These are top C headers that are used for 1239 >libecc configuration, i.e. activate given hash/curve/signature 1240 >algorithms at compilation time through ifdefs. 1241 1242Finally, various useful scripts are provided: 1243 1244 * [14] Scripts: in [scripts](scripts/) 1245 1246 >Tools to expand the libecc with new user defined curves. 1247 1248Here is a big picture of the library architecture summarizing the links 1249between the modules previously described: 1250 1251<pre> 1252 +-------------------------+ 1253 |EC*DSA signature | 1254 |algorithms | <------------------+ 1255 |(ISO 14888-3) [6] | | 1256 +-----------+-------------+ | 1257 ^ | 1258 | | 1259 +-----------+-------------+ +----------+------------+ 1260 |Curves (SECP, Brainpool, | | Hash | 1261 |FRP, ...) | | functions | 1262 | [5] | | [7] | 1263 +-----------+-------------+ +-----------------------+ 1264 ^ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@ 1265 | @ {Useful auxiliary modules}@ 1266 +-----------+-------------+ @ +------------------------+@ 1267 | Elliptic curves [4] | @ | Utils [8] |@ 1268 | core (scalar mul, ...) | @ +------------------------+@ 1269 +-----------+-------------+ @ | Sig Self tests [9] |@ 1270 ^ @ | Arith Self tests [10] |@ 1271 | @ | User Examples [11] |@ 1272 | @ +------------------------+@ 1273 | @ | External deps [12] |@ 1274 +-----------+-------------+ @ +------------------------+@ 1275 | Fp finite fields [3] | @ | LibECC conf files [13] |@ 1276 | arithmetic | @ +------------------------+@ 1277 +-----------+-------------+ @ | Scripts [14] |@ 1278 ^ @ +------------------------+@ 1279 | @@@@@@@@@@@@@@@@@@@@@@@@@@@@@ 1280 +-----------+-------------+ +------------------------+ 1281 | NN natural [2] | <------+ Machine related | 1282 | numbers arithmetic | | (words, ...) [1] | 1283 +-------------------------+ +------------------------+ 1284 1285</pre> 1286 1287## Integration with hardware acceleration: IPECC 1288 1289On the IPECC branch of the libecc repository, there is an integration 1290with the [IPECC](https://github.com/ANSSI-FR/IPECC) hardware accelerator 1291project. This project provides hardware acceleration for ECC points operations 1292(addition, doubling, scalar multiplication, etc.) with advanced SCA countermeasures. 1293 1294In order to use this accelerator, please follow these steps. First checkout the 1295IPECC branch: 1296 1297<pre> 1298 $ git clone https://github.com/libecc/libecc 1299 $ git checkout -b IPECC 1300</pre> 1301 1302Then fetch the dedicated driver on the [IPECC repository](https://github.com/ANSSI-FR/IPECC) 1303(this will clone the current repository and place the IPECC drivers in the `src/curve` folder): 1304 1305<pre> 1306 $ make install_hw_driver 1307</pre> 1308 1309Then, you can compile the library with hardware acceleration by selecting the underlying platform: 1310 1311<pre> 1312 $ make clean && CC=arm-linux-gnueabihf-gcc EXTRA_CFLAGS="-Wall -Wextra -O3 -g3 -mcpu=cortex-a9 -mfpu=vfpv3 -mfloat-abi=hard -static" VERBOSE=1 USE_EC_HW=1 USE_EC_HW_DEVMEM=1 USE_EC_HW_LOCKING=1 BLINDING=1 make 1313</pre> 1314 1315Please note that `USE_EC_HW=1` selects the hardware accelerator (this is mandatory to activate the hardware acceleration backend in libecc), 1316and `USE_EC_HW_DEVMEM=1` selects the DEVMEM backend (you can use `USE_EC_HW_STANDALONE=1` for the standalone mode, `USE_EC_HW_UIO=1` for UIO, 1317and `USE_EC_HW_SOCKET_EMUL=1` for the socket emulation using the Python server). 1318We also override the `CC` compiler to `arm-linux-gnueabihf-gcc` for the Zynq platform (adapt at your will depending on your 1319target), and add some necessary extra CFLAGS for the platform (as well as a `-static` binary compilation to avoid library dependency issues). 1320Finally, `USE_EC_HW_LOCKING=1` is used here for thread safety during hardware access: this flag is necessary for multi-threading. 1321 1322libecc has been successfully tested on a [Zynq Arty Z7](https://digilent.com/reference/programmable-logic/arty-z7/start) board with 1323a **factor 6** performance improvement compared to pure software on the same platform (with SCA countermeasures): 1324 1325<pre> 1326az7-ecc-axi:/home/petalinux# ./ec_self_tests_sw perf 1327======= Performance test ======================== 1328[+] ECDSA-SHA224/FRP256V1 perf: 6 sign/s and 6 verif/s 1329[+] ECDSA-SHA224/SECP192R1 perf: 9 sign/s and 9 verif/s 1330[+] ECDSA-SHA224/SECP224R1 perf: 7 sign/s and 7 verif/s 1331[+] ECDSA-SHA224/SECP256R1 perf: 6 sign/s and 6 verif/s 1332... 1333 1334az7-ecc-axi:/home/petalinux# ./ec_self_tests_hw perf 1335======= Performance test ======================== 1336[+] ECDSA-SHA224/FRP256V1 perf: 34 sign/s and 32 verif/s 1337[+] ECDSA-SHA224/SECP192R1 perf: 57 sign/s and 52 verif/s 1338[+] ECDSA-SHA224/SECP224R1 perf: 44 sign/s and 39 verif/s 1339[+] ECDSA-SHA224/SECP256R1 perf: 34 sign/s and 32 verif/s 1340[+] ECDSA-SHA224/SECP384R1 perf: 16 sign/s and 15 verif/s 1341[+] ECDSA-SHA224/SECP521R1 perf: 8 sign/s and 8 verif/s 1342[+] ECDSA-SHA224/BRAINPOOLP192R1 perf: 57 sign/s and 52 verif/s 1343[+] ECDSA-SHA224/BRAINPOOLP224R1 perf: 44 sign/s and 40 verif/s 1344</pre> 1345 1346