Skip to main content

2020 | OriginalPaper | Buchkapitel

Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms

verfasst von : Lukas Malina, Sara Ricci, Petr Dzurenda, David Smekal, Jan Hajny, Tomas Gerlich

Erschienen in: Innovative Security Solutions for Information Technology and Communications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Most of the cryptographic constructions deployed in practical systems today, in particular digital signatures and key-establishment schemes, are vulnerable to attacks using quantum computers. Post-quantum cryptography (PQC) deals with the design and implementation of cryptographic algorithms that are resistant to these attacks. In this paper, we evaluate the NIST’s PQC competition candidates with respect to their suitability for the implementation on special hardware platforms. In particular, we focus on the implementability on constrained platforms (e.g., smart cards, small single-board computers) on one side and on the performance on very fast hardware-accelerated platforms (i.e., field-programmable gate arrays - FPGAs) on the other side. Besides the analysis of the candidates’ design features affecting the performance on these devices and security aspects, we present also the practical results from the existing implementation on contemporary hardware.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Albrecht, M.R., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F., Wallner, A.: Implementing RLWE-based schemes using an RSA co-processor. IACR Trans. Cryptograph. Hardware Embedded Syst. 2019(1), 169–208 (2019) Albrecht, M.R., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F., Wallner, A.: Implementing RLWE-based schemes using an RSA co-processor. IACR Trans. Cryptograph. Hardware Embedded Syst. 2019(1), 169–208 (2019)
3.
Zurück zum Zitat Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange-a new hope. In: USENIX Security Symposium, vol. 2016 (2016) Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange-a new hope. In: USENIX Security Symposium, vol. 2016 (2016)
4.
Zurück zum Zitat Basu, K., Soni, D., Nabeel, M., Karri, R.: NIST post-quantum cryptography-a hardware evaluation study. IACR Cryptol. ePrint Archive 2019, 47 (2019) Basu, K., Soni, D., Nabeel, M., Karri, R.: NIST post-quantum cryptography-a hardware evaluation study. IACR Cryptol. ePrint Archive 2019, 47 (2019)
7.
Zurück zum Zitat Boorghany, A., Jalili, R.: Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers. IACR Cryptol. ePrint Archive 2014, 78 (2014) Boorghany, A., Jalili, R.: Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers. IACR Cryptol. ePrint Archive 2014, 78 (2014)
8.
Zurück zum Zitat Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embedded Comput. Syst. (TECS) 14(3), 42 (2015) Boorghany, A., Sarmadi, S.B., Jalili, R.: On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards. ACM Trans. Embedded Comput. Syst. (TECS) 14(3), 42 (2015)
9.
Zurück zum Zitat Bos, J., et al.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1006–1018. ACM (2016) Bos, J., et al.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1006–1018. ACM (2016)
10.
Zurück zum Zitat Bos, J., et al.: CRYSTALS-kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2018) Bos, J., et al.: CRYSTALS-kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE (2018)
12.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2013)MATH Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2013)MATH
14.
Zurück zum Zitat Ebrahimi, S., Bayat-Sarmadi, S., Mosanaei-Boorani, H.: Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE IoT J. 6, 5500–5507 (2019) Ebrahimi, S., Bayat-Sarmadi, S., Mosanaei-Boorani, H.: Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT. IEEE IoT J. 6, 5500–5507 (2019)
15.
Zurück zum Zitat Ferozpuri, A., Gaj, K.: High-speed FPGA implementation of the NIST round 1 rainbow signature scheme. In: 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1–8. IEEE (2018) Ferozpuri, A., Gaj, K.: High-speed FPGA implementation of the NIST round 1 rainbow signature scheme. In: 2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1–8. IEEE (2018)
19.
Zurück zum Zitat Howe, J., Rafferty, C., Khalid, A., O’Neill, M.: Compact and provably secure lattice-based signatures in hardware. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE (2017) Howe, J., Rafferty, C., Khalid, A., O’Neill, M.: Compact and provably secure lattice-based signatures in hardware. In: 2017 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1–4. IEEE (2017)
22.
Zurück zum Zitat Koziel, B., Azarderakhsh, R., Kermani, M.M., Jao, D.: Post-quantum cryptography on FPGA based on isogenies on elliptic curves. IEEE Trans. Circuits Syst. I Regul. Pap. 64(1), 86–99 (2016)CrossRef Koziel, B., Azarderakhsh, R., Kermani, M.M., Jao, D.: Post-quantum cryptography on FPGA based on isogenies on elliptic curves. IEEE Trans. Circuits Syst. I Regul. Pap. 64(1), 86–99 (2016)CrossRef
23.
Zurück zum Zitat Kuo, P.C., et al.: Post-quantum key exchange on FPGAs. IACR Cryptol. ePrint Archive 2017, 690 (2017) Kuo, P.C., et al.: Post-quantum key exchange on FPGAs. IACR Cryptol. ePrint Archive 2017, 690 (2017)
24.
Zurück zum Zitat Lamport, L.: Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International Palo Alto (1979) Lamport, L.: Constructing digital signatures from a one-way function. Technical report, Technical Report CSL-98, SRI International Palo Alto (1979)
25.
Zurück zum Zitat Martín-López, E., Laing, A., Lawson, T., Alvarez, R., Zhou, X.Q., O’brien, J.L.: Experimental realization of Shor’s quantum factoring algorithm using qubit recycling. Nat. Photonics 6(11), 773 (2012)CrossRef Martín-López, E., Laing, A., Lawson, T., Alvarez, R., Zhou, X.Q., O’brien, J.L.: Experimental realization of Shor’s quantum factoring algorithm using qubit recycling. Nat. Photonics 6(11), 773 (2012)CrossRef
26.
Zurück zum Zitat Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114–116 (1978) Mceliece, R.J.: A public-key cryptosystem based on algebraic. Coding Thv 4244, 114–116 (1978)
28.
Zurück zum Zitat Moses, T.: Quantum computing and cryptography. Entrust Inc., January 2009 Moses, T.: Quantum computing and cryptography. Entrust Inc., January 2009
29.
Zurück zum Zitat Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Software and hardware implementation of lattice-cased cryptography schemes (2017) Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I., Cammarota, R.: Software and hardware implementation of lattice-cased cryptography schemes (2017)
31.
Zurück zum Zitat Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159–166 (1986)MathSciNetMATH Niederreiter, H.: Knapsack-type cryptosystems and algebraic coding theory. Prob. Control Inf. Theory 15(2), 159–166 (1986)MathSciNetMATH
34.
Zurück zum Zitat Pöppelmann, T.: Efficient implementation of ideal lattice-based cryptography. IT-Inf. Technol. 59(6), 305–309 (2017) Pöppelmann, T.: Efficient implementation of ideal lattice-based cryptography. IT-Inf. Technol. 59(6), 305–309 (2017)
35.
Zurück zum Zitat Saarinen, M.J.O.: Ring-LWE ciphertext compression and error correction: tools for lightweight post-quantum cryptography. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 15–22. ACM (2017) Saarinen, M.J.O.: Ring-LWE ciphertext compression and error correction: tools for lightweight post-quantum cryptography. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 15–22. ACM (2017)
37.
Zurück zum Zitat Soni, D., Basu, K., Nabeel, M., Karri, R.: A hardware evaluation study of NIST post-quantum cryptographic signature schemes (2020) Soni, D., Basu, K., Nabeel, M., Karri, R.: A hardware evaluation study of NIST post-quantum cryptographic signature schemes (2020)
40.
Zurück zum Zitat Yuan, Y., Fukushima, K., Kiyomoto, S., Takagi, T.: Memory-constrained implementation of lattice-based encryption scheme on standard Java card. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 47–50. IEEE (2017) Yuan, Y., Fukushima, K., Kiyomoto, S., Takagi, T.: Memory-constrained implementation of lattice-based encryption scheme on standard Java card. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 47–50. IEEE (2017)
Metadaten
Titel
Towards Practical Deployment of Post-quantum Cryptography on Constrained Platforms and Hardware-Accelerated Platforms
verfasst von
Lukas Malina
Sara Ricci
Petr Dzurenda
David Smekal
Jan Hajny
Tomas Gerlich
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-41025-4_8