A toolbox for software optimization of QC-MDPC code-based cryptosystems

被引:0
作者
Nir Drucker
Shay Gueron
机构
[1] University of Haifa,
[2] Amazon Web Services Inc.,undefined
来源
Journal of Cryptographic Engineering | 2019年 / 9卷
关键词
QC-MDPC; Code-based cryptography; Post-Quantum Cryptography; 94A60; 14G50; 94B35; 94B15;
D O I
暂无
中图分类号
学科分类号
摘要
The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based on problems that remain intractable even with large-scale quantum computers. One example is the family of code-based cryptosystems that relies on the syndrome decoding problem. Recent work by Misoczki et al. (in: 2013 IEEE international symposium on information theory, pp 2069–2073, 2013. https://doi.org/10.1109/ISIT.2013.6620590) showed a variant of McEliece encryption which is based on quasi cyclic moderate density parity check (QC-MDPC) codes and has significantly smaller keys than the original McEliece encryption. It was followed by the newly proposed QC-MDPC-based cryptosystems CAKE (Barreto et al. in: IMA international conference on cryptography and coding, Springer, Berlin, pp 207–226, 2017) and Ouroboros (Deneuville et al. in Ouroboros: a simple, secure and efficient key exchange protocol based on coding theory, Springer, Cham, pp 18–34, 2017. https://doi.org/10.1007/978-3-319-59879-6_2). These motivate dedicated new software optimizations. This paper lists the cryptographic primitives that QC-MDPC cryptosystems commonly employ, studies their software optimizations on modern processors, and reports the achieved speedups. It also assesses methods for side channel protection of the implementations and their performance costs. These optimized primitives offer a useful toolbox that can be used, in various ways, by designers and implementers of QC-MDPC cryptosystems. Indeed, we applied our methods to generate a platform-specific additional implementation of “BIKE”—a QC-MDPC key encapsulation mechanism (KEM) proposal submitted to the NIST Post-Quantum Project (NIST:Post-Quantum Cryptography—call for proposals, https://csrc.nist.gov/Projects/Post-Quantum-Cryptography, 2017). This gave a 5×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$5\times $$\end{document} speedup compared to the reference implementation.
引用
收藏
页码:341 / 357
页数:16
相关论文
共 28 条
[1]  
Aguilar C(2018)Efficient encryption from random quasi-cyclic codes IEEE Trans. Inf. Theory 64 3927-3943
[2]  
Blazy O(1969)On the minimum computation time of functions Trans. Am. Math. Soc. 142 291-314
[3]  
Deneuville JC(2016)Structural cryptanalysis of McEliece schemes with compact keys Des. Codes Cryptogr. 79 87-112
[4]  
Gaborit P(1962)Low-density parity-check codes IRE Trans. Inf. Theory 8 21-28
[5]  
Zémor G(2013)A j-lanes tree hashing mode and j-lanes SHA-256 J. Inf. Secur. 4 7-553
[6]  
Cook SA(2014)Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256 J. Inf. Secur. 5 91-139
[7]  
Aanderaa SO(2010)Efficient implementation of the Galois Counter Mode using a carry-less multiplier and a fast reduction algorithm Inf. Process. Lett. 110 549-44:27
[8]  
Faugère JC(2012)Simultaneous hashing of multiple messages J. Inf. Secur. 3 319-116
[9]  
Otmani A(1997)A look at the rule of three Am. Stat. 51 137-716
[10]  
Perret L(1963)Multiplication of multidigit numbers on automata Sov. Phys. Dokl. 7 595-undefined