Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

被引:10
|
作者
Canto, Alvaro Cintas [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Marymount Univ, 2807 North Glebe Rd, Arlington, VA 22207 USA
[2] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
[3] Florida Atlant Univ, 777 Glades Rd, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Code-based cryptography; low-power fault detection; McEliece cryptosystem; post-quantum cryptography; ERROR-DETECTION ARCHITECTURES; RING-LWE; MULTIPLICATION; CRYPTOGRAPHY;
D O I
10.1145/3544921
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, lowenergy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solutionwhose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022-2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Secure post-quantum group key exchange: Implementing a solution based on Kyber
    Pablos, Jose Ignacio Escribano
    Vasco, Maria Isabel Gonzalez
    IET COMMUNICATIONS, 2023, 17 (06) : 758 - 773
  • [42] Extended Number Theoretic Transform for Lightweight Post-Quantum Cryptosystems in IoT
    Joo, Hyeong-Gun
    Lee, Seunghwan
    Shin, Dong-Joon
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (06): : 7376 - 7388
  • [43] A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications
    Septien-Hernandez, Jose-Antonio
    Arellano-Vazquez, Magali
    Contreras-Cruz, Marco Antonio
    Ramirez-Paredes, Juan-Pablo
    SENSORS, 2022, 22 (02)
  • [44] Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems
    Seck, Boly
    Cayrel, Pierre-Louis
    Diop, Idy
    Dragoi, Vlad-Florin
    Couzon, Kalen
    Colombier, Brice
    Grosso, Vincent
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 219 - 234
  • [45] Complexity and Performance of QC-MDPC Code-based McEliece Cryptosystems
    Al Rasheed, Omran
    Ivanis, Predrag
    2015 12TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), 2015, : 31 - 34
  • [46] LEDAkem: A Post-quantum Key Encapsulation Mechanism Based on QC-LDPC Codes
    Baldi, Marco
    Barenghi, Alessandro
    Chiaraluce, Franco
    Pelosi, Gerardo
    Santini, Paolo
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 : 3 - 24
  • [47] Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
    Farooq, Sana
    Altaf, Ayesha
    Iqbal, Faiza
    Thompson, Ernesto Bautista
    Vargas, Debora Libertad Ramirez
    Diez, Isabel de la Torre
    Ashraf, Imran
    SENSORS, 2023, 23 (12)
  • [48] Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography
    Canto, Alvaro Cintas
    Sarker, Ausmita
    Kaur, Jasmin
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (03) : 791 - 797
  • [49] Hardware Design and Implementation of Classic McEliece Post-Quantum Cryptosystem Based on FPGA
    Chen, Shaofen
    Lin, Haiyan
    Huang, Wenjin
    Huang, Yihua
    2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [50] A Comprehensive Analysis of Constant-time Polynomial Inversion for Post-quantum Cryptosystems
    Barenghi, Alessandro
    Pelosi, Gerardo
    17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020), 2020, : 269 - 276