A pure hardware implementation of CRYSTALS-KYBER PQC algorithm through resource reuse

被引:53
作者
Huang, Yiming [1 ]
Huang, Miaoqing [2 ]
Lei, Zhongkui [1 ]
Wu, Jiaxuan [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing, Peoples R China
[2] Univ Arkansas, Fayetteville, AR 72701 USA
[3] ShanghaiTech Univ, Shanghai, Peoples R China
关键词
CRYSTALS-KYBER; cryptography; field-programmable gate arrays (FPGAs); PQC;
D O I
10.1587/elex.17.20200234
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a pure hardware implementation of CRYSTALS-KYBER algorithm on Xilinx FPGAs. CRYSTALS-KYBER is one of 26 candidate algorithms in Round 2 of NIST Post-Quantum Cryptography (PQC) standardization process. The proposed design focuses on maximizing resource utilization by reusing most of the functional modules in the encapsulation and decapsulation processes of the algorithm. For instance, the hash module integrates several different hash functions in one module. Efficient parallel and pipelined computations are applied in the NTT module. Through the analysis of simulation and synthesis results, it is found that the proposed work has the advantages of higher frequencies and lower execution times. The scheme operates at 155 MHz and 192 MHz frequencies on Xilinx Artix-7 and Virtex-7 FPGAs, respectively. Compared with the performance of an embedded Cortex-M4 processor, the hardware implementation can achieve a maximum speedup of 129 times for encryption/decryption.
引用
收藏
页数:6
相关论文
共 30 条
[1]  
Alkim E., 2016, 6 SEC PRIV ADV CRYPT, P332, DOI [10.1007/978-3-319-49445-6_19, DOI 10.1007/978-3-319-49445-6_19]
[2]  
Bernstein D.J., 2015, TWEETABLE FIPS, V202
[3]  
Bertoni G., 2011, KECCAK SPECIFICATION
[4]   CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM [J].
Bos, Joppe ;
Ducas, Leo ;
Kiltz, Eike ;
Lepoint, Tancrede ;
Lyubashevsky, Vadim ;
Schanck, John M. ;
Schwabe, Peter ;
Seiler, Gregor ;
Stehle, Damien .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :353-367
[5]  
Botros L, 2019, LECT NOTES COMPUT SC, V11627, P209, DOI 10.1007/978-3-030-23696-0_11
[6]  
Brakerski Z, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P575
[7]   Implementing and Benchmarking Three Lattice-based Post-Quantum Cryptography Algorithms Using Software/Hardware Codesign [J].
Dang, Viet B. ;
Farahmand, Farnoud ;
Andrzejczak, Michal ;
Gaj, Kris .
2019 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (ICFPT 2019), 2019, :206-214
[8]  
Dworkin MJ, 2015, Federal Information ProcessingStandards, DOI DOI 10.6028/NIST.FIPS.202
[9]  
Ferozpuri A, 2018, PROC INT CONF RECON
[10]   Secure Integration of Asymmetric and Symmetric Encryption Schemes [J].
Fujisaki, Eiichiro ;
Okamoto, Tatsuaki .
JOURNAL OF CRYPTOLOGY, 2013, 26 (01) :80-101