Mckeycutter: A High-throughput Key Generator of Classic McEliece on Hardware

被引:0
|
作者
Zhu, Yihong [1 ]
Zhu, Wenping [1 ]
Chen, Chen [1 ]
Zhu, Min [2 ]
Li, Zhengdong [1 ]
Wei, Shaojun [1 ]
Liu, Leibo [1 ]
机构
[1] Tsinghua Univ, Beijing, Peoples R China
[2] Micro Innovat Integrated Circuit Design, Wuxi, Jiangsu, Peoples R China
来源
2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC | 2023年
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Post-quantum cryptography; McEliece; high-throughput; GF(2) Gauss elimination; constant-time sort; FPGA;
D O I
10.1109/DAC56929.2023.10247918
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Classic McEliece is a code-based quantum-resistant public-key scheme characterized with relative high encapsulation/decapsulation speed and small ciphertexts, with an in-depth analysis on its security. However, slow key generation with large public key size make it hard for wider applications. Based on this observation, Mckeycutter, a high-throughput key generator in hardware, is proposed to accelerate the key generation in Classic McEliece based on algorithm-hardware co-design. Meanwhile the storage overhead caused by large-size keys is also minimized. First, compact large-size GF(2) Gauss elimination method is presented by adopting naive processing array and memory-friendly scheduling strategy. Second, an optimized constant-time hardware sorter is proposed to support regular memory accesses with less comparators and storage. Third, algorithm-level pipeline is enabled for high-throughput processing, allowing for concurrent key generations. Our FPGA implementation results achieve around 4x improvements in throughput with 9 similar to 14x less memory-time product compared with the existing FPGA solutions.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A Generator of Numerically-Tailored and High-Throughput Accelerators for Batched GEMMs
    Ledoux, Louis
    Casas, Marc
    2022 IEEE 30TH INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2022), 2022, : 200 - 209
  • [32] High-throughput analysis of total nitrogen content that replaces the classic Kjeldahl method
    Yasuhara, T
    Nokihara, K
    JOURNAL OF AGRICULTURAL AND FOOD CHEMISTRY, 2001, 49 (10) : 4581 - 4583
  • [33] Enabling high-throughput experimentation through high-throughput analysis
    Schafer, Wes
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2016, 252
  • [34] High-Throughput Hardware Design for 3D-HEVC Disparity Estimation
    Perleberg, Murilo
    Susin, Altamiro
    Afonso, Vladimir
    Agostini, Luciano
    Zatt, Bruno
    Porto, Marcelo
    Conceicao, Ruhan
    IEEE DESIGN & TEST, 2020, 37 (03) : 22 - 29
  • [35] Designing High-Throughput Hardware Accelerator for Stream Cipher HC-128
    Chattopadhyay, Anupam
    Khalid, Ayesha
    Maitra, Subhamoy
    Raizada, Shashwat
    2012 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 2012), 2012, : 1448 - 1451
  • [36] Low-Cost and High-Throughput Hardware Accelerator for Deblocking Filter in HEVC
    Saravanan, P.
    Megalingam, R.
    Sanjana, S.
    Priyadharshini, T. Sharon
    Prashanth, S.
    Kanna, P. Vignesh
    IETE JOURNAL OF RESEARCH, 2025, 71 (03) : 909 - 918
  • [37] High-throughput, accurate Monte Carlo simulation on CPU hardware for PET applications
    Scheins, J. J.
    Lenz, M.
    Pietrzyk, U.
    Shah, N. J.
    Lerche, C.
    PHYSICS IN MEDICINE AND BIOLOGY, 2021, 66 (18):
  • [38] Strategies for Implementing Hardware-Assisted High-Throughput Cellular Image Analysis
    Tse, Henry Tat Kwong
    Meng, Pingfan
    Gossett, Daniel R.
    Irturk, Ali
    Kastner, Ryan
    Di Carlo, Dino
    JALA, 2011, 16 (06): : 422 - 430
  • [39] A High-Throughput and Compact Hardware Implementation for the Reconstruction Loop in HEVC Intra Encoding
    Fan, Yibo
    Huang, Leilei
    Xie, Zheng
    Zeng, Xiaoyang
    IEICE TRANSACTIONS ON ELECTRONICS, 2017, E100C (06): : 643 - 654
  • [40] Scalable, High-Throughput and Modular Hardware-Based String Matching Algorithm
    Hajiabadi, Mohammad Hossein
    Saidi, Hossein
    Behdadfar, Mohammad
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 192 - 198