Cryptographic Engineering a Fast and Efficient SIKE in FPGA
نویسندگان
چکیده
Recent attacks have shown that SIKE is not secure and should be used in its current state. However, this work was completed before these were discovered might beneficial to other cryptosystems such as SQISign. The primary downside of performance. achieves new speed records even using less resources than the state-of-the-art. Our approach entails designing optimizing a field multiplier, SIKE-optimized Keccak unit, high-level controller. On Xilinx Virtex-7 FPGA, architecture performs NIST Level 1 scheme key encapsulation decapsulation functions 2.23 2.39 ms, respectively. combined time 4.62 which outperforms next best implementation by nearly 2 ms. for 1, 2, 3 parameter sets. Only our 5 set beat an all-out performance implementation. implementations also efficiently utilize FPGA resources, achieving area-time product metrics all Overall, continues push bar accelerating computations make stronger case standardization.
منابع مشابه
Energy-Efficient Cryptographic Engineering Paradigm
We motivate the notion of green cryptographic engineering, wherein we discuss several approaches to energy minimization or energy efficient cryptographic processes. We propose the amortization of computations paradigm in the design of cryptographic schemes; this paradigm can be used in line with existing approaches. We describe an example structure that exemplifies this paradigm and at the end ...
متن کاملCryptographic Applications using FPGA Technology
Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implem...
متن کاملFast and efficient FPGA implementation of connected operators
The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems. This paper presents its efficien...
متن کاملFpga-based Single Chip Cryptographic Solution (u)
(U) ABSTRACT (U) The use of Field Programmable Gate Arrays (FPGAs) in Type I Cryptographic equipment has historically been limited. While FPGA use is allowed, restrictions on how they are used can result in inefficient processing and an increase in system size, weight and power. For example, redundancy and isolation of functionality is required through physically separate devices. This paper in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions in Embedded Computing Systems
سال: 2023
ISSN: ['1539-9087', '1558-3465']
DOI: https://doi.org/10.1145/3584919