A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

نویسندگان

چکیده

Post-quantum cryptosystems should be prepared before the advent of powerful quantum computers to ensure information secure in our daily life. In 2016 a post-quantum standardization contest was launched by National Institute Standards and Technology (NIST), there have been lots works concentrating on evaluation these candidate protocols, mainly pure software or through hardware-software co-design methodology different platforms. As progresses third round July 2020 with only 7 finalists 8 alternate candidates remained, more dedicated specific hardware designs considered illustrate intrinsic property certain protocol achieve better performance. To this end, we present standalone design CRYSTALS-KYBER, amodule learning-with-errors (MLWE) based key exchange mechanism (KEM) within FPGA platform. Through elaborate scheduling sampling number theoretic transform (NTT) related calculations, decent performance is achieved limited resources. The way that Encode/Decode tweaked Fujisaki-Okamoto are implemented demonstrated detail. Analysis about minimizing memory footprint also given out. summary, realize adaptive chosen ciphertext attack (CCA) Kyber all selectable module dimension k smallest Xilinx Artix-7 device. Our computes key-generation, encapsulation (encryption) decapsulation (decryption reencryption) phase 3768/5079/6668 cycles when = 2, 6316/7925/10049 3, 9380/11321/13908 4, consuming 7412/6785 LUTs, 4644/3981 FFs, 2126/1899 slices, 2/2 DSPs 3/3 BRAMs server/client 6.2/6.0 ns critical path delay, outperforming corresponding high level synthesis (HLS) co-designs large extent.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM

Recent advances in quantum computing and the announcement by the National Institute of Standards and Technology (NIST) to define new standards for digital-signature, encryption, and keyestablishment protocols increased interest in post-quantum cryptographic schemes. This paper introduces Kyber (part of the CRYSTALS – Cryptographic Suite for Algebraic Lattices – package that will be submitted to...

متن کامل

FPGA-based Hardware Implementation of Compact AES Encryption Hardware Core

Most of current embedded applications need AES algorithm implementations of small size and low power consumption to assure safe information conveyance. In this article, we present the implementation of a compact ASE hardware encryption core that is suitable for resource-limited applications based on FPGA technology. The core has 8-bit data path structure and supports encryption with 128-bit key...

متن کامل

Efficient FPGA Hardware Implementation of Secure Hash Function SHA-2

The Hash function has been studied by designers with the goal to improve its performances in terms of area, frequency and throughput. The Hash function is used in many embedded systems to provide security. It is become the default choice for security services in numerous applications. In this paper, we proposed a new design for the SHA-256 and SHA-512 functions. Moreover, the proposed design ha...

متن کامل

Design and FPGA Implementation of Secure Key Management

Cryptographic device ensures the secure information exchange and private authentication even in the face of various attacks. In this paper, we focus on how to prevent physical attacks and present the PUF-based security secret-key generation architecture. We develop a novel Spread PUF architecture that is more secured and has higher performance than existing PUF architectures. Our thesis also gi...

متن کامل

FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA

To the best of our knowledge, we present the first hardware implementation of isogeny-based cryptography available in the literature. Particularly, we present the first implementation of the supersingular isogeny Diffie-Hellman (SIDH) key exchange, which features quantum-resistance. We optimize this design for speed by creating a high throughput multiplier unit, taking advantage of parallelizat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2021

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2021.i2.328-356