Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads

被引:0
|
作者
Koteshwara, Sandhya [1 ]
Kumar, Manoj [1 ]
Pattnaik, Pratap [1 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
Post Quantum Cryptography; lattice-based cryptography; Learning With Errors; PQC; LWE;
D O I
10.1145/3458903.3458905
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The mathematical constructs, nature of computations and challenges in optimizing lattice post-quantum cryptographic algorithms on modern many-core processors are discussed in this paper. Identification of time-consuming functions and subsequent hardware optimization using vector units and hardware accelerators of one of the candidates, CRYSTALS-Kyber, leads to performance improvement of around 52% for its SHA3 variant and 83% for its AES variant. Detailed Cycles-per-Instruction (CPI) stack breakdown before and after optimization indicates a CPI of around 0.5 and dominance of load/store operations in these workloads.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Hardware Circuits and Systems Design for Post-Quantum Cryptography-A Tutorial Brief
    Xie, Jiafeng
    Zhao, Wenfeng
    Lee, Hanho
    Roy, Debapriya Basu
    Zhang, Xinmiao
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1670 - 1676
  • [22] On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography
    Jedlicka, Petr
    Malina, Lukas
    Socha, Petr
    Gerlich, Tomas
    Martinasek, Zdenek
    Hajny, Jan
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [23] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [24] A note on quantum security for post-quantum cryptography
    Song, Fang
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [25] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    [J]. PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [26] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586
  • [27] A Mathematical Perspective on Post-Quantum Cryptography
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Tschache, Alexander
    [J]. MATHEMATICS, 2022, 10 (15)
  • [28] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [29] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    [J]. Microprocessors and Microsystems, 2021, 87
  • [30] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91