Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads

被引:0
|
作者
Koteshwara, Sandhya [1 ]
Kumar, Manoj [1 ]
Pattnaik, Pratap [1 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
Post Quantum Cryptography; lattice-based cryptography; Learning With Errors; PQC; LWE;
D O I
10.1145/3458903.3458905
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The mathematical constructs, nature of computations and challenges in optimizing lattice post-quantum cryptographic algorithms on modern many-core processors are discussed in this paper. Identification of time-consuming functions and subsequent hardware optimization using vector units and hardware accelerators of one of the candidates, CRYSTALS-Kyber, leads to performance improvement of around 52% for its SHA3 variant and 83% for its AES variant. Detailed Cycles-per-Instruction (CPI) stack breakdown before and after optimization indicates a CPI of around 0.5 and dominance of load/store operations in these workloads.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Post-quantum cryptography: lattice signatures
    Johannes Buchmann
    Richard Lindner
    Markus Rückert
    Michael Schneider
    [J]. Computing, 2009, 85 : 105 - 125
  • [2] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    [J]. COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [3] Post-quantum cryptography: lattice identification schemes
    Silva, Rosemberg
    Cayrel, Pierre-Louis
    Buchmann, Johannes
    [J]. PUBLICATIONES MATHEMATICAE-DEBRECEN, 2011, 79 (3-4): : 729 - 748
  • [4] Hardware Design and Implementation of Post-Quantum Cryptography Kyber
    Zeng, Qingru
    Li, Quanxin
    Zhao, Baoze
    Jiao, Han
    Huang, Yihua
    [J]. 2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [5] Post-Quantum Cryptography
    Monroe, Don
    [J]. COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [6] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    [J]. Nature, 2017, 549 : 188 - 194
  • [7] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. NATURE, 2017, 549 (7671) : 188 - 194
  • [8] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware
    Gaj, Kris
    [J]. PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
  • [9] Post-Quantum Lattice-Based Cryptography Implementations: A Survey
    Nejatollahi, Hamid
    Dutt, Nikil
    Ray, Sandip
    Regazzoni, Francesco
    Banerjee, Indranil
    Cammarota, Rosario
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [10] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +