Skip to main content
Top

2021 | OriginalPaper | Chapter

9. Post-Quantum Cryptographic Hardware and Embedded Systems

Authors : Brian Koziel, Mehran Mozaffari Kermani, Reza Azarderakhsh

Published in: Emerging Topics in Hardware Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

When evaluating different cryptosystems, one primary metric is the cost to deploy the scheme in today’s software or hardware platforms. Given the option, hardware acceleration is typically preferred as optimizing a cryptosystem’s computations in logical gates leads to improvements in performance, power, and energy. Here, we survey the progress on acceleration of post-quantum key establishment cryptosystems in hardware. We examine the critical computations in the third round of NIST’s PQC standardization competition, how to efficiently speed these up in hardware, and the state-of-the-art results of these schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference L.K. Grover, A fast quantum mechanical algorithm for database search, in STOC ’96: Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing (1996) L.K. Grover, A fast quantum mechanical algorithm for database search, in STOC ’96: Proceedings of the twenty-eighth annual ACM symposium on Theory of Computing (1996)
3.
go back to reference L. Chen, S. Jordan, Report on Post-Quantum Cryptography (2016). NIST IR 8105. L. Chen, S. Jordan, Report on Post-Quantum Cryptography (2016). NIST IR 8105.
4.
go back to reference V.B. Dang, F. Farahmand, M. Andrzejczak, K. Mohajerani, D.T. Nguyen, K. Gaj, Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches. Cryptology ePrint Archive, Report 2020/795 (2020). https://eprint.iacr.org/2020/795 V.B. Dang, F. Farahmand, M. Andrzejczak, K. Mohajerani, D.T. Nguyen, K. Gaj, Implementation and benchmarking of round 2 candidates in the NIST post-quantum cryptography standardization process using hardware and software/hardware co-design approaches. Cryptology ePrint Archive, Report 2020/795 (2020). https://​eprint.​iacr.​org/​2020/​795
5.
go back to reference D.J. Bernstein, T. Chou, T. Lange, I.V. Maurich, R. Misoczki, R. Niederhagen, E. Persichetti, C. Peters, P. Schwabe, N. Sendrier, J. Szefer, W. Wang, M. Albrecht, C. Cid, K.G. Paterson, C.J. Tjhai, M. Tomlinson, Classic McEliece, NIST Round 3 Submissions (2020) D.J. Bernstein, T. Chou, T. Lange, I.V. Maurich, R. Misoczki, R. Niederhagen, E. Persichetti, C. Peters, P. Schwabe, N. Sendrier, J. Szefer, W. Wang, M. Albrecht, C. Cid, K.G. Paterson, C.J. Tjhai, M. Tomlinson, Classic McEliece, NIST Round 3 Submissions (2020)
6.
go back to reference P. Schwabe, R. Avanzi, J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J.M. Schanck, G. Seiler, D. Stehle, CRYSTALS - Cryptographic Suite for Algebraic Lattices: Kyber, NIST Round 3 Submissions (2020) P. Schwabe, R. Avanzi, J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J.M. Schanck, G. Seiler, D. Stehle, CRYSTALS - Cryptographic Suite for Algebraic Lattices: Kyber, NIST Round 3 Submissions (2020)
7.
go back to reference C. Chen, O. Danba, J. Hoffstein, A. Hulsing, J. Rivjneveld, J.M. Schanck, P. Schwabe, W. Whyte, Z. Zhang, NTRU, NIST Round 3 Submissions (2020) C. Chen, O. Danba, J. Hoffstein, A. Hulsing, J. Rivjneveld, J.M. Schanck, P. Schwabe, W. Whyte, Z. Zhang, NTRU, NIST Round 3 Submissions (2020)
8.
go back to reference J.-P. D’Anvers, A. Karmakar, S.S. Roy, F. Vercauteren, SABER, NIST Round 3 Submissions (2020) J.-P. D’Anvers, A. Karmakar, S.S. Roy, F. Vercauteren, SABER, NIST Round 3 Submissions (2020)
9.
go back to reference N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich, G. Zemor, V. Vasseur, S. Ghosh, BIKE - Bit Flipping Key Encapsulation, NIST Round 3 Submissions (2020) N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, S. Gueron, T. Guneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.-P. Tillich, G. Zemor, V. Vasseur, S. Ghosh, BIKE - Bit Flipping Key Encapsulation, NIST Round 3 Submissions (2020)
10.
go back to reference M. Naehrig, E. Alkim, J. Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa, I. Mironov, V. Nikolaenko, C. Peikert, A. Raghunathan, D. Stebila, FrodoKem, NIST Round 3 Submissions (2020) M. Naehrig, E. Alkim, J. Bos, L. Ducas, K. Easterbrook, B. LaMacchia, P. Longa, I. Mironov, V. Nikolaenko, C. Peikert, A. Raghunathan, D. Stebila, FrodoKem, NIST Round 3 Submissions (2020)
11.
go back to reference C.A. Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, E. Persichetti, G. Zemor, J. Bos, HQC - Hamming Quasi-Cyclic, NIST Round 3 Submissions (2020) C.A. Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville, P. Gaborit, E. Persichetti, G. Zemor, J. Bos, HQC - Hamming Quasi-Cyclic, NIST Round 3 Submissions (2020)
12.
go back to reference D.J. Bernstein, C. Chuengsatiansup, T. Lange, C.v. Vredendaal, NTRU Prime, NIST Round 3 Submissions (2020) D.J. Bernstein, C. Chuengsatiansup, T. Lange, C.v. Vredendaal, NTRU Prime, NIST Round 3 Submissions (2020)
13.
go back to reference D. Jao, R. Azarderakhsh, M. Campagna, C. Costello, L. De Feo, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, V. Soukharev, D. Urbanik, G. Pereira, SIKE - Supersingular Isogeny Key Encapsulation, NIST Round 3 Submissions (2020) D. Jao, R. Azarderakhsh, M. Campagna, C. Costello, L. De Feo, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, J. Renes, V. Soukharev, D. Urbanik, G. Pereira, SIKE - Supersingular Isogeny Key Encapsulation, NIST Round 3 Submissions (2020)
14.
go back to reference E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, August 15–19, 1999, Proceedings (1999), pp. 537–554. https://doi.org/10.1007/3-540-48405-1_34 E. Fujisaki, T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, in Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference, Santa Barbara, California, August 15–19, 1999, Proceedings (1999), pp. 537–554. https://​doi.​org/​10.​1007/​3-540-48405-1_​34
15.
go back to reference E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384–386 (1978) E. Berlekamp, R. McEliece, H. van Tilborg, On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
16.
go back to reference W. Wang, J. Szefer, R. Niederhagen, FPGA-based Niederreiter cryptosystem using binary Goppa codes, in Cryptographic Hardware and Embedded Systems—CHES 2017. CHES 2017 01 (2018), pp. 77–98 W. Wang, J. Szefer, R. Niederhagen, FPGA-based Niederreiter cryptosystem using binary Goppa codes, in Cryptographic Hardware and Embedded Systems—CHES 2017. CHES 2017 01 (2018), pp. 77–98
17.
go back to reference J. Hu, W. Wang, R.C.C. Cheung, H. Wang, Optimized polynomial multiplier over commutative rings on FPGAs: A case study on bike, in 2019 International Conference on Field-Programmable Technology (ICFPT) (2019), pp. 231–234 J. Hu, W. Wang, R.C.C. Cheung, H. Wang, Optimized polynomial multiplier over commutative rings on FPGAs: A case study on bike, in 2019 International Conference on Field-Programmable Technology (ICFPT) (2019), pp. 231–234
19.
go back to reference S. Gao, T. Mateer, Additive fast Fourier transforms over finite fields. IEEE Trans. Inf. Theory 56(12), 6265–6272 (2010)MathSciNetCrossRef S. Gao, T. Mateer, Additive fast Fourier transforms over finite fields. IEEE Trans. Inf. Theory 56(12), 6265–6272 (2010)MathSciNetCrossRef
21.
go back to reference L.L. Joiner, J.J. Komo, Decoding binary bch codes, in Proceedings IEEE Southeastcon ’95. Visualize the Future (1995), pp. 67–73 L.L. Joiner, J.J. Komo, Decoding binary bch codes, in Proceedings IEEE Southeastcon ’95. Visualize the Future (1995), pp. 67–73
22.
go back to reference N. Drucker, S. Gueron, D. Kostic, QC-MDPC decoders with several shades of gray, in Post-Quantum Cryptography, ed. by J. Ding, J.-P. Tillich (Springer International Publishing, Cham, 2020), pp. 35–50CrossRef N. Drucker, S. Gueron, D. Kostic, QC-MDPC decoders with several shades of gray, in Post-Quantum Cryptography, ed. by J. Ding, J.-P. Tillich (Springer International Publishing, Cham, 2020), pp. 35–50CrossRef
23.
go back to reference V.B. Dang, F. Farahmand, M. Andrzejczak, K. Gaj, Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign, in 2019 International Conference on Field-Programmable Technology (ICFPT) (2019), pp. 206–214 V.B. Dang, F. Farahmand, M. Andrzejczak, K. Gaj, Implementing and benchmarking three lattice-based post-quantum cryptography algorithms using software/hardware codesign, in 2019 International Conference on Field-Programmable Technology (ICFPT) (2019), pp. 206–214
24.
go back to reference J.M.B. Mera, F. Turan, A. Karmakar, S.S. Roy, I. Verbauwhede, Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism. Cryptology ePrint Archive, Report 2020/321 (2020). https://eprint.iacr.org/2020/321 J.M.B. Mera, F. Turan, A. Karmakar, S.S. Roy, I. Verbauwhede, Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism. Cryptology ePrint Archive, Report 2020/321 (2020). https://​eprint.​iacr.​org/​2020/​321
29.
30.
go back to reference G. Xin, J. Han, T. Yin, Y. Zhou, J. Yang, X. Cheng, X. Zeng, VPQC: A domain-specific vector processor for post-quantum cryptography based on RISC-V architecture. IEEE Trans. Circ. Syst. I Regular Papers 67(8), 2672–2684 (2020)CrossRef G. Xin, J. Han, T. Yin, Y. Zhou, J. Yang, X. Cheng, X. Zeng, VPQC: A domain-specific vector processor for post-quantum cryptography based on RISC-V architecture. IEEE Trans. Circ. Syst. I Regular Papers 67(8), 2672–2684 (2020)CrossRef
32.
go back to reference D.T. Nguyen, V.B. Dang, K. Gaj, High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software/hardware codesign, in Applied Reconfigurable Computing. Architectures, Tools, and Applications, ed. by F. Rincón, J. Barba, H.K.H. So, P. Diniz, J. Caba (Springer International Publishing, Cham, 2020), pp. 247–257 D.T. Nguyen, V.B. Dang, K. Gaj, High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software/hardware codesign, in Applied Reconfigurable Computing. Architectures, Tools, and Applications, ed. by F. Rincón, J. Barba, H.K.H. So, P. Diniz, J. Caba (Springer International Publishing, Cham, 2020), pp. 247–257
33.
go back to reference J. Cooley, J.W. Tukey, An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19, 297–301 (1965)MathSciNetCrossRef J. Cooley, J.W. Tukey, An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19, 297–301 (1965)MathSciNetCrossRef
34.
go back to reference W.M. Gentleman, G. Sande, Fast Fourier transforms: For fun and profit, in Proceedings of the November 7–10, 1966, Fall Joint Computer Conference, Ser. AFIPS ’66 (Fall) (Association for Computing Machinery, New York, 1966), pp. 563–578. https://doi.org/10.1145/1464291.1464352 W.M. Gentleman, G. Sande, Fast Fourier transforms: For fun and profit, in Proceedings of the November 7–10, 1966, Fall Joint Computer Conference, Ser. AFIPS ’66 (Fall) (Association for Computing Machinery, New York, 1966), pp. 563–578. https://​doi.​org/​10.​1145/​1464291.​1464352
36.
go back to reference B. Koziel, R. Azarderakhsh, M.M. Kermani, Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA, in Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, December 11–14, 2016, Proceedings (2016), pp. 191–206. https://doi.org/10.1007/978-3-319-49890-4_11 B. Koziel, R. Azarderakhsh, M.M. Kermani, Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA, in Progress in Cryptology - INDOCRYPT 2016 - 17th International Conference on Cryptology in India, Kolkata, December 11–14, 2016, Proceedings (2016), pp. 191–206. https://​doi.​org/​10.​1007/​978-3-319-49890-4_​11
37.
go back to reference B. Koziel, R. Azarderakhsh, D. Jao, Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman, in Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, August 16–18, 2017, Revised Selected Papers (2017), pp. 64–81. https://doi.org/10.1007/978-3-319-72565-9_4 B. Koziel, R. Azarderakhsh, D. Jao, Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman, in Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, August 16–18, 2017, Revised Selected Papers (2017), pp. 64–81. https://​doi.​org/​10.​1007/​978-3-319-72565-9_​4
38.
go back to reference B. Koziel, R. Azarderakhsh, M. Mozaffari-Kermani, A high-performance and scalable hardware architecture for isogeny-based cryptography. IEEE Trans. Comput. Special Sect. Cryptograph. Eng. Post-Quantum World PP(99), 1–1 (2018) B. Koziel, R. Azarderakhsh, M. Mozaffari-Kermani, A high-performance and scalable hardware architecture for isogeny-based cryptography. IEEE Trans. Comput. Special Sect. Cryptograph. Eng. Post-Quantum World PP(99), 1–1 (2018)
39.
go back to reference B. Koziel, A. Ackie, R. El Khatib, R. Azarderakhsh, M.M. Kermani, Sike’d up: Fast hardware architectures for supersingular isogeny key encapsulation. IEEE Trans. Circ. Syst. I Regular Papers PP, 1–13 (2020) B. Koziel, A. Ackie, R. El Khatib, R. Azarderakhsh, M.M. Kermani, Sike’d up: Fast hardware architectures for supersingular isogeny key encapsulation. IEEE Trans. Circ. Syst. I Regular Papers PP, 1–13 (2020)
42.
43.
go back to reference P.L. Montgomery, Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48, 243–264 (1987)MathSciNetCrossRef P.L. Montgomery, Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48, 243–264 (1987)MathSciNetCrossRef
44.
go back to reference C. Costello, H. Hisil, A simple and compact algorithm for SIDH with arbitrary degree isogenies, in Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, December 3–7, 2017, Proceedings, Part II (2017), pp. 303–329. https://doi.org/10.1007/978-3-319-70697-9_11 C. Costello, H. Hisil, A simple and compact algorithm for SIDH with arbitrary degree isogenies, in Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, December 3–7, 2017, Proceedings, Part II (2017), pp. 303–329. https://​doi.​org/​10.​1007/​978-3-319-70697-9_​11
45.
go back to reference A. Faz-Hernández, J. López, E. Ochoa-Jiménez, F. Rodríguez-Henríquez, A faster software implementation of the supersingular isogeny Diffie-Hellman key exchange protocol. IEEE Trans. Comput. PP(99), 1–1 (2017) A. Faz-Hernández, J. López, E. Ochoa-Jiménez, F. Rodríguez-Henríquez, A faster software implementation of the supersingular isogeny Diffie-Hellman key exchange protocol. IEEE Trans. Comput. PP(99), 1–1 (2017)
46.
go back to reference L.D. Feo, D. Jao, J. Plût, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209–247 (2014)MathSciNetMATH L.D. Feo, D. Jao, J. Plût, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209–247 (2014)MathSciNetMATH
47.
go back to reference R. Azarderakhsh, D. Jao, K. Kalach, B. Koziel, C. Leonardi, Key compression for isogeny-based cryptosystems, in Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, May 30–June 03, 2016 (2016), pp. 1–10. http://doi.acm.org/10.1145/2898420.2898421 R. Azarderakhsh, D. Jao, K. Kalach, B. Koziel, C. Leonardi, Key compression for isogeny-based cryptosystems, in Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, May 30–June 03, 2016 (2016), pp. 1–10. http://​doi.​acm.​org/​10.​1145/​2898420.​2898421
48.
go back to reference C. Costello, D. Jao, P. Longa, M. Naehrig, J. Renes, D. Urbanik, Efficient compression of SIDH public keys, in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30–May 4, 2017, Proceedings, Part I (2017), pp. 679–706. https://doi.org/10.1007/978-3-319-56620-7_24 C. Costello, D. Jao, P. Longa, M. Naehrig, J. Renes, D. Urbanik, Efficient compression of SIDH public keys, in Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30–May 4, 2017, Proceedings, Part I (2017), pp. 679–706. https://​doi.​org/​10.​1007/​978-3-319-56620-7_​24
49.
go back to reference G. Zanon, M.A. Simplicio Jr., G.C.C.F. Pereira, J. Doliskani, P.S.L.M. Barreto, Faster isogeny-based compressed key agreement, in Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, April 9–11, 2018, Proceedings (2018), pp. 248–268. https://doi.org/10.1007/978-3-319-79063-3_12 G. Zanon, M.A. Simplicio Jr., G.C.C.F. Pereira, J. Doliskani, P.S.L.M. Barreto, Faster isogeny-based compressed key agreement, in Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, April 9–11, 2018, Proceedings (2018), pp. 248–268. https://​doi.​org/​10.​1007/​978-3-319-79063-3_​12
50.
go back to reference M. Naehrig, J. Renes, Dual isogenies and their application to public-key compression for isogeny-based cryptography, in Advances in Cryptology – ASIACRYPT 2019, ed. by S.D. Galbraith, S. Moriai (Springer International Publishing, Cham, 2019), pp. 243–272CrossRef M. Naehrig, J. Renes, Dual isogenies and their application to public-key compression for isogeny-based cryptography, in Advances in Cryptology – ASIACRYPT 2019, ed. by S.D. Galbraith, S. Moriai (Springer International Publishing, Cham, 2019), pp. 243–272CrossRef
52.
53.
go back to reference J. Howe, M. Martinoli, E. Oswald, F. Regazzoni, Optimised lattice-based key encapsulation in hardware, in Second NIST Post-Quantum Cryptography Standardization Conference 2019 (2019) J. Howe, M. Martinoli, E. Oswald, F. Regazzoni, Optimised lattice-based key encapsulation in hardware, in Second NIST Post-Quantum Cryptography Standardization Conference 2019 (2019)
Metadata
Title
Post-Quantum Cryptographic Hardware and Embedded Systems
Authors
Brian Koziel
Mehran Mozaffari Kermani
Reza Azarderakhsh
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-64448-2_9