On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography

被引:52
作者
Howe, James [1 ]
Khalid, Ayesha [1 ]
Rafferty, Ciara [1 ]
Regazzoni, Francesco [2 ]
O'Neill, Maire [1 ]
机构
[1] Queens Univ Belfast, CSIT, Belfast BT7 1NN, Antrim, North Ireland
[2] Univ Svizzera Italiana, Adv Learning & Res Inst, CH-6900 Lugano, Switzerland
基金
英国工程与自然科学研究理事会;
关键词
Lattice-based cryptography; post-quantum cryptography; discrete Gaussian sampling; hardware security; cryptography;
D O I
10.1109/TC.2016.2642962
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised samplers are desirable both for high-speed and low-area applications. Due to the inherent structure of existing discrete Gaussian sampling methods, lattice-based cryptosystems are vulnerable to side-channel attacks, such as timing analysis. In this paper, the first comprehensive evaluation of discrete Gaussian samplers in hardware is presented, targeting FPGA devices. Novel optimised discrete Gaussian sampler hardware architectures are proposed for the main sampling techniques. An independent-time design of each of the samplers is presented, offering security against side-channel timing attacks, including the first proposed constant-time Bernoulli, Knuth-Yao, and discrete Ziggurat sampler hardware designs. For a balanced performance, the Cumulative Distribution Table (CDT) sampler is recommended, with the proposed hardware CDT design achieving a throughput of 59.4 million samples per second for encryption, utilising just 43 slices on a Virtex 6 FPGA and 16.3 million samples per second for signatures with 179 slices on a Spartan 6 device.
引用
收藏
页码:322 / 334
页数:13
相关论文
共 39 条
  • [31] Peikert C, 2010, LECT NOTES COMPUT SC, V6223, P80, DOI 10.1007/978-3-642-14623-7_5
  • [32] Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware
    Poeppelmann, Thomas
    Gueneysu, Tim
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 68 - 85
  • [33] Pöppelmann T, 2014, IEEE INT SYMP CIRC S, P2796, DOI 10.1109/ISCAS.2014.6865754
  • [34] Poppelmann Thomas, 2012, Progress in Cryptology - LATINCRYPT 2012. Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, P139, DOI 10.1007/978-3-642-33481-8_8
  • [35] On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
    Regev, Oded
    [J]. JOURNAL OF THE ACM, 2009, 56 (06)
  • [36] A Masked Ring-LWE Implementation
    Reparaz, Oscar
    Roy, Sujoy Sinha
    Vercauteren, Frederik
    Verbauwhede, Ingrid
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 683 - 702
  • [37] Roy S. B., 2013, Proc. International 3D Systems Integration Conference, P1
  • [38] Shor PW, 1997, SIAM J COMPUT, V26, P1484, DOI [10.1137/S0097539795293172, 10.1137/S0036144598347011]
  • [39] Silverman JH, 2007, LECT NOTES COMPUT SC, V4377, P208