Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

被引:10
|
作者
Canto, Alvaro Cintas [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Marymount Univ, 2807 North Glebe Rd, Arlington, VA 22207 USA
[2] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
[3] Florida Atlant Univ, 777 Glades Rd, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Code-based cryptography; low-power fault detection; McEliece cryptosystem; post-quantum cryptography; ERROR-DETECTION ARCHITECTURES; RING-LWE; MULTIPLICATION; CRYPTOGRAPHY;
D O I
10.1145/3544921
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, lowenergy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solutionwhose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022-2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Code-Based Public-Key Cryptosystems for the Post-Quantum Period
    Kuznetsov, Alexandr
    Svatovskij, Igor
    Kiyan, Nastya
    Pushkar'ov, Andriy
    2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 125 - 130
  • [2] Reliable Code-Based Post-Quantum Cryptographic Algorithms through Fault Detection on FPGA
    Cintas-Canto, Alvaro
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    2023 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE, NORCAS, 2023,
  • [3] Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems
    Malygina E.S.
    Kutsenko A.V.
    Novoselov S.A.
    Kolesnikov N.S.
    Bakharev A.O.
    Khilchuk I.S.
    Shaporenko A.S.
    Tokareva N.N.
    Journal of Applied and Industrial Mathematics, 2024, 18 (01) : 103 - 121
  • [4] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99
  • [5] Constant Weight Strings in Constant Time: a Building Block for Code-based Post-quantum Cryptosystems
    Barenghi, Alessandro
    Pelosi, Gerardo
    17TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2020 (CF 2020), 2020, : 132 - 141
  • [6] Code-Based Schemes for Post-Quantum Digital Signatures
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Pushkar'ov, Andriy
    Mialkovskyi, Danylo
    Smirnov, Oleksii
    Kuznetsova, Tetiana
    PROCEEDINGS OF THE 2019 10TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS - TECHNOLOGY AND APPLICATIONS (IDAACS), VOL. 2, 2019, : 707 - 712
  • [7] Key Reuse Attacks on Post-quantum Cryptosystems, Revisited
    Wang, Ke
    Zhang, Zhenfeng
    Jiang, Haodong
    Xie, Huiqin
    Li, Yanjun
    Sun, Ying
    Han, Lidong
    COMPUTER JOURNAL, 2024, 67 (01): : 323 - 337
  • [8] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
  • [9] Testing of Code-Based Pseudorandom Number Generators for Post-Quantum Application
    Kuznetsov, Alexandr
    Kiian, Anastasiia
    Smirnov, Oleksii
    Cherep, Alla
    Kanabekova, Meruert
    Chepurko, Iryna
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 172 - 177
  • [10] Structural analysis of code-based algorithms of the NIST post-quantum call
    Gonzalez de la Torre, M. A.
    Encinas, L. Hernandez
    Garcia, J. I. Sanchez
    LOGIC JOURNAL OF THE IGPL, 2024,