Efficient Hardware Implementation of Finite Field Arithmetic AB+C for Binary Ring-LWE Based Post-Quantum Cryptography

نویسندگان

چکیده

Post-quantum cryptography (PQC) has gained significant attention from the community recently as it is proven that existing public-key cryptosystems are vulnerable to attacks launched well-developed quantum computers. The finite field arithmetic $AB+C$ , where A and C integer polynomials $B$ a binary polynomial, key component for Ring-learning-with-errors (BRLWE)-based encryption scheme (a low-complexity PQC suitable emerging lightweight applications). In this paper, we propose novel hardware implementation of through three stages interdependent efforts: (i) rigorous mathematical formulation process presented first; (ii) an efficient architecture then with detailed description; (iii) thorough also been given along comparison. Overall, proposed basic structure ( $u=1$ ) outperforms designs, e.g., involves 46.3\% less area-delay product (ADP) than \cite{b14b} $n=512$ ; design offers very performance in time-complexity can be used many future applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography

Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form p = 2 · 23 − 1 with b even, typically used in such cryptosystem. Our modular multiplication algorithm exploits the special structure present in such primes. We compare the effici...

متن کامل

Efficient Unified Arithmetic for Hardware Cryptography

The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF (q), where q = p k and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1], the US federal Digital Signature Standard [2], elliptic curve cryptography [3, 4], and also recently identity based cryptography [5, 6]. Most p...

متن کامل

Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware

In recent years lattice-based cryptography has emerged as quantum secure and theoretically elegant alternative to classical cryptographic schemes (like ECC or RSA). In addition to that, lattices are a versatile tool and play an important role in the development of efficient fully or somewhat homomorphic encryption (SHE/FHE) schemes. In practice, ideal lattices defined in the polynomial ring Zp[...

متن کامل

Binary Ring-LWE Hardware with Power Side-Channel Countermeasures

We describe the first hardware implementation of a quantum-secure encryption scheme along with its lowcost power side-channel countermeasures. The encryption uses an implementation-friendly Binary-Ring-Learning-with-Errors (BRLWE) problem with binary errors that can be efficiently generated in hardware. We demonstrate that a direct implementation of BRLWE exhibits vulnerability to power side-ch...

متن کامل

Ring-LWE Cryptography for the Number Theorist

In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [EHL, ELOS] gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebraic number and its relationship to Mahler me...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Emerging Topics in Computing

سال: 2021

ISSN: ['2168-6750', '2376-4562']

DOI: https://doi.org/10.1109/tetc.2021.3091982