Configurable and High-level Pipelined Lattice-based Post Quantum Cryptography Hardware Accelerator Design

被引:1
|
作者
Mu, Jianan [1 ,2 ,3 ]
Tan, Huajie [4 ]
Chen, Shuai [5 ]
Cai, Min [5 ]
Ye, Jing [1 ,2 ,3 ]
Li, Huawei [1 ,2 ,3 ]
Li, Xiaowei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, State Key Lab Proc, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Beijing, Peoples R China
[3] CASTEST, Beijing, Peoples R China
[4] Peking Univ, Beijing, Peoples R China
[5] Binary Semi Co Ltd, Changsha, Peoples R China
基金
中国国家自然科学基金;
关键词
Number Theoretic Transform; Secure Hash Algorithm 3; Scalable hardware design; Pipeline design; Post-Quantum Cryptography;
D O I
10.1109/ATS59501.2023.10318005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Number Theoretic Transform (NTT) and Secure Hash Algorithm 3 (SHA3), are the two main operators in the lattice-based Post-Quantum Cryptography (PQC) algorithms. Lattice-based PQC algorithms have different parameter settings, e.g., the length and modulus of NTT polynomials and the different hash functions. Motivated by the demands for more versatile NTT and SHA3 hardware accelerators, we implement the NTT and SHA3 designs that can accommodate to different parameters at run-time. Furthermore, to reduce the running cycles of the whole NTT operation and whole SHA3 operation including data transferring and calculation, we propose a pipelined architecture to optimize the gap between data transfer and calculation process in high-level. The designed configurable accelerators can be embedded in SoC to accelerate different lattice-based PQC algorithms efficiently. The experimental results show that our high-level pipelined and configurable NTT and SHA3 designs have good area-time efficiency. In specific, for the NTT design, our architecture is 4.1 times more area-time efficient compared with the state-of-the-art. For SHA3, our architecture is 1.4 times more area-time efficient over the existing configurable SHA3 designs.
引用
收藏
页码:231 / 236
页数:6
相关论文
共 50 条
  • [1] Optimizing Lattice-based Post-Quantum Cryptography Codes for High-Level Synthesis
    Guerrieri, Andrea
    Marques, Gabriel Da Silva
    Regazzoni, Francesco
    Upegui, Andres
    [J]. 2022 25TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2022, : 777 - 784
  • [2] A High Throughput and Configurable Pseudo-random Number Extension Generator for Lattice-based Post-quantum Cryptography
    Li, Xiang
    Liu, Dongsheng
    Hu, Ang
    Li, Aobo
    Yang, Shuo
    Lu, Jiahao
    Lei, Jianming
    [J]. 2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 596 - 600
  • [3] Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms
    Akcay, Latif
    Yalcin, Berna Ors
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2024,
  • [4] Configurable Energy-Efficient Lattice-Based Post-Quantum Cryptography Processor for IoT Devices
    Kim, ByungJun
    Park, Jaehan
    Moon, Seunghyun
    Kang, Kiseo
    Sim, Jae-Yoon
    [J]. ESSCIRC 2022- IEEE 48TH EUROPEAN SOLID STATE CIRCUITS CONFERENCE (ESSCIRC), 2022, : 525 - 528
  • [5] Pipelined High-throughput NTT Architecture for Lattice-Based Cryptography
    Tan, Weihang
    Wang, Antian
    Lao, Yingjie
    Zhang, Xinmiao
    Parhi, Keshab K.
    [J]. PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [6] Post-Quantum Lattice-Based Cryptography Implementations: A Survey
    Nejatollahi, Hamid
    Dutt, Nikil
    Ray, Sandip
    Regazzoni, Francesco
    Banerjee, Indranil
    Cammarota, Rosario
    [J]. ACM COMPUTING SURVEYS, 2019, 51 (06)
  • [7] TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
    Wan, Lipeng
    Zheng, Fangyu
    Li, Jingqiang
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 249 - 269
  • [8] PDL A High-Level Hardware Design Language for Pipelined Processors
    Zagieboylo, Drew
    Sherk, Charles
    Suh, Gookwon Edward
    Myers, Andrew C.
    [J]. PROCEEDINGS OF THE 43RD ACM SIGPLAN INTERNATIONAL CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '22), 2022, : 719 - 732
  • [9] Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography
    Sabani, Maria E.
    Savvas, Ilias K.
    Garani, Georgia
    [J]. SIGNALS, 2024, 5 (02): : 216 - 243
  • [10] Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
    Oder, Tobias
    Gueneysu, Tim
    Valencia, Felipe
    Khalid, Ayesha
    O'Neill, Maire
    Regazzoni, Francesco
    [J]. 2016 INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2016,