SSE Implementation of Multivariate PKCs on Modern x86 CPUs

نویسندگان

  • Anna Inn-Tung Chen
  • Ming-Shing Chen
  • Tien-Ren Chen
  • Chen-Mou Cheng
  • Jintai Ding
  • Eric Li-Hsiang Kuo
  • Frost Yu-Shuang Lee
  • Bo-Yin Yang
چکیده

Multivariate Public Key Cryptosystems (MPKCs) are often touted as future-proofing against Quantum Computers. It also has been known for efficiency compared to “traditional” alternatives. However, this advantage seems to erode with the increase of arithmetic resources in modern CPUs and improved algorithms, especially with respect to Elliptic Curve Cryptography (ECC). In this paper, we show that hardware advances do not just favor ECC. Modern commodity CPUs also have many small integer arithmetic/logic resources, embodied by SSE2 or other vector instruction sets, that are useful for MPKCs. In particular, Intel’s SSSE3 instructions can speed up both public and private maps over prior software implementations of Rainbow-type systems up to 4×. Furthermore, MPKCs over fields of relatively small odd prime characteristics can exploit SSE2 instructions, supported by most modern 64-bit Intel and AMD CPUs. For example, Rainbow over F31 can be up to 2× faster than prior implementations of similarly-sized systems over F16. Here a key advance is in using Wiedemann (as opposed to Gauss) solvers to invert the small linear systems in the central maps. We explain the techniques and design choices in implementing our chosen MPKC instances over fields such as F31, F16 and F256. We believe that our results can easily carry over to modern FPGAs, which often contain a large number of small multipliers, usable by odd-field MPKCs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Small Odd Prime Field Multivariate PKCs

We show that Multivariate Public Key Cryptosystems (MPKCs) over fields of small odd prime characteristic, say 31, can be highly efficient. Indeed, at the same design security of 2 under the best known attacks, odd-char MPKC is generally faster than prior MPKCs over F2k , which are in turn faster than “traditional” alternatives. This seemingly counter-intuitive feat is accomplished by exploiting...

متن کامل

Accelerating cellular automata simulations using AVX and CUDA

We investigated various methods of parallelization of the Frish-Hasslacher-Pomeau (FHP) cellular automata algorithm for modeling fluid flow. These methods include SSE, AVX, and POSIX Threads for central processing units (CPUs) and CUDA for graphics processing units (GPUs). We present implementation details of the FHP algorithm based on AVX/SSE and CUDA technologies. We found that (a) using AVX ...

متن کامل

An Implementation of a FIR Filter on a GPU

In this paper we describe an implementation of the Finite Impulse Response (FIR) filter on a modern graphics processing unit (GPU). The FIR filter has a number of applications in audio processing. Modern GPUs are known to have higher GFLOPs rates compared to the CPUs. The new PCI-X Express bus enables fast data transfers between the video card and the main memory. We compare the GPU implementat...

متن کامل

Library of random number generators based on SSE command set

Pseudo random numbers, generated recursively by deterministic rules, represent one of important ingredients in algorithms for numerical simulations such as molecular dynamics and of Monte Carlo simulations, widely used in physics, chemistry, material science and cryptography [1]. It is a great challenge to design random number generators (RNGs) producing pseudo random numbers that behave as rea...

متن کامل

Performance Analysis of the Lattice Boltzmann Method on x86-64 Architectures

The Lattice Boltzmann method (LBM) is a well established algorithm to simulate fluid flow. The complexity of todays 3D simulation problems resulting in long computation times together with the fact that a standard implementation of the LBM only achieves a small fraction of the potential of a modern CPU is the motivation for this performance analysis. We show in our paper, that it is crucial to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009