Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism

被引:2
|
作者
Kuang, Randy [1 ]
Perepechaenko, Maria [1 ]
Toth, Ryan [1 ]
Barbeau, Michel [2 ]
机构
[1] Quantropi Inc, Ottawa, ON, Canada
[2] Carleton Univ, Sch Comp Sci, Ottawa, ON, Canada
来源
RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022 | 2023年 / 13857卷
关键词
Post-Quantum Cryptography; Public-Key Cryptography; PQC; Key Encapsulation Mechanism; KEM; Multivariate Polynomials; PQC Performance;
D O I
10.1007/978-3-031-31108-6_18
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents the results of benchmarking the quantum-safe Multivariate Public Key Cryptosystem (MPPK) key encapsulation mechanism for quadratic solvable univariate polynomials. We used a benchmarking tool containing implementations of the four NIST Post-Quantum Cryptography (PQC) finalists: Kyber, McEliece, NTRU, and Saber. The benchmark demonstrates that the performance of MPPK is comparable with that of the four PQC algorithms, offering relatively fast key generation and small key sizes. Key encapsulation and decapsulation performance are comparable with the PQC schemes, with room for improvement.
引用
收藏
页码:239 / 255
页数:17
相关论文
共 50 条
  • [21] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 196 - 205
  • [22] A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p)
    Kuang, Randy
    2021 2ND ASIA CONFERENCE ON COMPUTERS AND COMMUNICATIONS (ACCC 2021), 2021, : 79 - 88
  • [23] A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer
    Mondal, Puja
    Kundu, Suparna
    Bhattacharya, Sarani
    Karmakar, Angshuman
    Verbauwhede, Ingrid
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT III, 2024, 14585 : 271 - 300
  • [24] Efficient constructions of certificate-based key encapsulation mechanism
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 96 - 106
  • [25] Performance Evaluation of the Classic McEliece Key Encapsulation Algorithm
    Kuznetsov, Alexandr
    Lutsenko, Maria
    Bagmut, Mykhaylo
    Zhora, Victor
    PROCEEDINGS OF THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 2, 2021, : 755 - 760
  • [26] Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key
    Dey, Jayashree
    Dutta, Ratna
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 374 - 381
  • [27] Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
    Nosouhi, Mohammad Reza
    Shah, Syed W.
    Pan, Lei
    Zolotavkin, Yevhen
    Nanda, Ashish
    Gauravaram, Praveen
    Doss, Robin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2160 - 2174
  • [28] Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems
    Petzoldt, Albrecht
    Thomae, Enrico
    Bulygin, Stanislav
    Wolf, Christopher
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 475 - +
  • [29] SaberX4: High-throughput Software Implementation of Saber Key Encapsulation Mechanism
    Roy, Sujoy Sinha
    2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 321 - 324
  • [30] (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
    Xagawa, Keita
    Yamakawa, Takashi
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 249 - 268