Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

被引:10
|
作者
Canto, Alvaro Cintas [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Marymount Univ, 2807 North Glebe Rd, Arlington, VA 22207 USA
[2] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
[3] Florida Atlant Univ, 777 Glades Rd, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Code-based cryptography; low-power fault detection; McEliece cryptosystem; post-quantum cryptography; ERROR-DETECTION ARCHITECTURES; RING-LWE; MULTIPLICATION; CRYPTOGRAPHY;
D O I
10.1145/3544921
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, lowenergy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solutionwhose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022-2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA
    Phoon, Jun-Hoe
    Lee, Wai-Kong
    Wong, Denis Chee-Keong
    Yap, Wun-She
    Goi, Bok-Min
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (12) : 2672 - 2684
  • [32] A toolbox for software optimization of QC-MDPC code-based cryptosystems
    Drucker, Nir
    Gueron, Shay
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (04) : 341 - 357
  • [33] McEliece and Niederreiter Cryptosystems Analysis in the Context of Post-Quantum Network Security
    Vambol, Aleksei
    Potii, Olexandr
    Kharchenko, Vyacheslav
    Bardis, Nikolaos
    2017 FOURTH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI), 2017, : 134 - 137
  • [34] A toolbox for software optimization of QC-MDPC code-based cryptosystems
    Nir Drucker
    Shay Gueron
    Journal of Cryptographic Engineering, 2019, 9 : 341 - 357
  • [35] Complexity of statistical attacks on QC-LDPC code-based cryptosystems
    Santini, Paolo
    Baldi, Marco
    Chiaraluce, Franco
    IET INFORMATION SECURITY, 2020, 14 (03) : 304 - 312
  • [36] FPGA Accelerated Post-Quantum Cryptography
    Li, He
    Tang, Yongming
    Que, Zhiqiang
    Zhang, Jiliang
    IEEE TRANSACTIONS ON NANOTECHNOLOGY, 2022, 21 : 685 - 691
  • [37] Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
    Koziel, Brian
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    Jao, David
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2017, 64 (01) : 86 - 99
  • [38] Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber
    Escribano Pablos, Jose Ignacio
    Gonzalez Vasco, Maria Isabel
    Marriaga, Misael Enrique
    Perez del Pozo, Angel Luis
    MATHEMATICS, 2020, 8 (10) : 1 - 23
  • [39] Punctured Reed-Muller code-based McEliece cryptosystems
    Lee, Wijik
    No, Jong-Seon
    Kim, Young-Sik
    IET COMMUNICATIONS, 2017, 11 (10) : 1543 - 1548
  • [40] Security of generalised Reed-Solomon code-based cryptosystems
    Baldi, Marco
    Chiaraluce, Franco
    Rosenthal, Joachim
    Santini, Paolo
    Schipani, Davide
    IET INFORMATION SECURITY, 2019, 13 (04) : 404 - 410