Skip to main content
Top

2022 | OriginalPaper | Chapter

The Rank-Based Cryptography Library

Authors : Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Yann Connan, Jérémie Coulaud, Philippe Gaborit, Anaïs Kominiarz

Published in: Code-Based Cryptography

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Rank-based cryptography provides cryptosystems that aim to be secure against both classical and quantum computers. In the past few years, the interest for code-based cryptography in the rank metric setting has tremendously increased notably since the beginning of the NIST post-quantum cryptography standardization process. This paper introduces RBC a library dedicated to Rank-Based Cryptography and details its design and architecture. The performances of RBC are illustrated against comparable state of the art librairies. RBC greatly outperforms those libraries as it is 2 to 5 times faster than NTL and 40 to 138 times faster than mp\(\mathbb {F}_q\) on the multiplication and inversion over \(\mathbb {F}_{q^m}^n\) which are the most critical operations when it comes to rank-based cryptography performances. In addition, the performances of ROLLO and RQC two rank-based cryptosystems provided by the library are reported for two platforms: a desktop computer equipped with an Intel Skylake-X CPU and an ARM Cortex-M4 microcontroller.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
[AAB+17b]
[AAB+18]
[AAB+19a]
[AAB+19b]
[AAB+20a]
[AAB+20b]
[ABC+]
go back to reference Melchor, C.A., et al.: Constant-time algorithms for ROLLO Melchor, C.A., et al.: Constant-time algorithms for ROLLO
[ABC+19]
go back to reference Al Abdouli, A.S., Bellini, E., Caullery, F., Manzano, M., Mateu, V.: Rank-metric encryption on arm-cortex M0: porting code-based cryptography to lightweight devices. In: Proceedings of the 6th ASIA Public-Key Cryptography Workshop (2019) Al Abdouli, A.S., Bellini, E., Caullery, F., Manzano, M., Mateu, V.: Rank-metric encryption on arm-cortex M0: porting code-based cryptography to lightweight devices. In: Proceedings of the 6th ASIA Public-Key Cryptography Workshop (2019)
[ABD+17a]
go back to reference Aragon, N., et al.: LAKE-Low rAnk parity check codes Key Exchange. NIST Post-Quantum Cryptography Standardization Project (Round 1) (2017) Aragon, N., et al.: LAKE-Low rAnk parity check codes Key Exchange. NIST Post-Quantum Cryptography Standardization Project (Round 1) (2017)
[ABD+17b]
go back to reference Aragon, N., et al.: LOCKER-LOw rank parity ChecK codes EncRyption. NIST Post-Quantum Cryptography Standardization Project (Round 1) (2017) Aragon, N., et al.: LOCKER-LOw rank parity ChecK codes EncRyption. NIST Post-Quantum Cryptography Standardization Project (Round 1) (2017)
[Ale03]
go back to reference Alekhnovich, M., et al.: More on average case vs approximation complexity. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, pp. 298–307 (2003) Alekhnovich, M., et al.: More on average case vs approximation complexity. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, pp. 298–307 (2003)
[ALR18]
go back to reference Augot, D., Loidreau, P., Robert, G.: Generalized Gabidulin codes over fields of any characteristic. Des. Codes Crypt. 86(8), 1807–1848 (2018)MathSciNetCrossRef Augot, D., Loidreau, P., Robert, G.: Generalized Gabidulin codes over fields of any characteristic. Des. Codes Crypt. 86(8), 1807–1848 (2018)MathSciNetCrossRef
[AMAB+20a]
[AMAB+20b]
[AMADG21]
go back to reference Melchor, C.A., Aragon, N., Dyseryn, V., Gaborit, P.: Fast and secure key generation for low rank parity check codes cryptosystems. In: 2021 IEEE International Symposium on Information Theory (ISIT) (2021) Melchor, C.A., Aragon, N., Dyseryn, V., Gaborit, P.: Fast and secure key generation for low rank parity check codes cryptosystems. In: 2021 IEEE International Symposium on Information Theory (ISIT) (2021)
[BMVT78]
go back to reference Berlekamp, E., McEliece, R., Van Tilborg, H.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384–386 (1978)CrossRef Berlekamp, E., McEliece, R., Van Tilborg, H.: On the inherent intractability of certain coding problems (corresp.). IEEE Trans. Inf. Theory 24(3), 384–386 (1978)CrossRef
[Gab85]
go back to reference Gabidulin, E.M.: Theory of codes with maximum rank distance. Problemy Peredachi Informatsii 21(1), 3–16 (1985)MathSciNetMATH Gabidulin, E.M.: Theory of codes with maximum rank distance. Problemy Peredachi Informatsii 21(1), 3–16 (1985)MathSciNetMATH
[GMRZ13]
go back to reference Gaborit, P., Murat, G., Ruatta, O., Zémor, G.: Low rank parity check codes and their application to cryptography. In: Proceedings of the Workshop on Coding and Cryptography (WCC) (2013) Gaborit, P., Murat, G., Ruatta, O., Zémor, G.: Low rank parity check codes and their application to cryptography. In: Proceedings of the Workshop on Coding and Cryptography (WCC) (2013)
[GT07]
go back to reference Gaudry, P., Thomé, E.: The MPFQ library and implementing curve-based key exchanges (2007) Gaudry, P., Thomé, E.: The MPFQ library and implementing curve-based key exchanges (2007)
[Gue10]
go back to reference Gueron, S.: Intel Advanced Encryption Standard (AES) new instructions set (2010) Gueron, S.: Intel Advanced Encryption Standard (AES) new instructions set (2010)
[HMV06]
go back to reference Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006)MATH Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006)MATH
[LMB+19]
go back to reference Lablanche, J., Mortajine, L., Benchaalal, O., Cayrel, P.-L., El Mrabet, N.: Optimized implementation of the NIST PQC submission ROLLO on microcontroller. IACR Cryptology ePrint Archive 2019:787 (2019) Lablanche, J., Mortajine, L., Benchaalal, O., Cayrel, P.-L., El Mrabet, N.: Optimized implementation of the NIST PQC submission ROLLO on microcontroller. IACR Cryptology ePrint Archive 2019:787 (2019)
[McE78]
go back to reference McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory, NASA (1978) McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory, NASA (1978)
Metadata
Title
The Rank-Based Cryptography Library
Authors
Nicolas Aragon
Slim Bettaieb
Loïc Bidoux
Yann Connan
Jérémie Coulaud
Philippe Gaborit
Anaïs Kominiarz
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-98365-9_2

Premium Partner