Multi-way High-Throughput Implementation of Kyber

被引:0
作者
Yu, Xuan [1 ]
Zhang, Jipeng [1 ]
Huang, Junhao [2 ]
Chen, Donglong [2 ]
Zhou, Lu [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Nanjing 211106, Peoples R China
[2] BNU HKBU United Int Coll, Guangdong Prov Key Lab IRADS, Zhuhai, Peoples R China
来源
INFORMATION SECURITY, PT II, ISC 2024 | 2025年 / 15258卷
基金
中国国家自然科学基金;
关键词
Post-quantum cryptography; Kyber; SIMD; Optimized implementation; Multi-way implementation;
D O I
10.1007/978-3-031-75764-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel approach to implement a multi-way Key Encapsulation Mechanism (KEM) that takes full advantage of the parallelism provided by SIMD instructions. Specifically, our multi-way KeyGen() function is capable of generating multiple unique key pairs simultaneously. To start, we introduce a multi-way data format to support the proposed multi-way KEM implementation. We then introduce a multi-way NTT implementation based on this novel data format. Compared to traditional one-way NTT implementation, our multi-way NTT significantly reduces the complicated permutation operations, leading to overall performance improvements. In terms of SHA3-related computations, while previous one-way Kyber implementations have used multi-way SHAKE to speed up the matrix and vector generation, the inherent execution flow of the one-way KEM cannot fully utilize the parallelism of the multi-way SHA3 implementation. On the contrary, our multi-way implementation effectively parallelizes these SHA3 computations, resulting in substantial speed enhancements. We have applied this methodology to Kyber on AVX2 and AVX-512, developing a 16-way Kyber implementation for AVX2 and a 32-way implementation for AVX-512. With faster multi-way NTT and fully parallelized SHA3 computations, the key generation, encapsulation, and decapsulation in Kyber on AVX2 and AVX-512 achieve impressive speed-ups of 36.0%/54.6%/25.9% and 80.6%/130.3%/51.3%, respectively, compared to traditional one-way AVX2 implementation. Lastly, we demonstrate the versatility of our multi-way approach in real-world applications. For example, the multi-way KeyGen() function can be seamlessly integrated into the TLS protocol using OpenSSL ENGINE APIs, extending its advantages to a wide range of TLS applications. Additionally, the multi-recipient KEM (mKEM) protocols used for secure group messaging can also benefit from our multi-way approach to enhance their performance.
引用
收藏
页码:41 / 60
页数:20
相关论文
共 33 条
  • [1] Faster Kyber and Dilithium on the Cortex-M4
    Abdulrahman, Amin
    Hwang, Vincent
    Kannwischer, Matthias J.
    Sprenkels, Daan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 853 - 871
  • [2] Alkim E., 2020, IACR Trans. Cryptogr. Hardw. Embed. Syst., P336
  • [3] Alwen J., How multi-recipient KEMs can help the deployment of post-quantum cryptography
  • [4] Avanzi R., 2019, NIST PQC Round, V2, P1
  • [5] Barnes R., 2023, RFC 9420, DOI [10.17487/RFC9420, DOI 10.17487/RFC9420]
  • [6] Hybrid Scalar/Vector Implementations of Keccak and SPHINCS+ on AArch64
    Becker, Hanno
    Kannwischer, Matthias J.
    [J]. PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 272 - 293
  • [7] Bernstein DJ, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P845
  • [8] CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM
    Bos, Joppe
    Ducas, Leo
    Kiltz, Eike
    Lepoint, Tancrede
    Lyubashevsky, Vadim
    Schanck, John M.
    Schwabe, Peter
    Seiler, Gregor
    Stehle, Damien
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, : 353 - 367
  • [9] Botros L, 2019, LECT NOTES COMPUT SC, V11627, P209, DOI 10.1007/978-3-030-23696-0_11
  • [10] Cheng Hao, 2022, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), P41, DOI [10.46586/tches.v2022.i2.41-68, DOI 10.46586/TCHES.V2022.I2.41-68]