Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

被引:10
|
作者
Canto, Alvaro Cintas [1 ]
Kermani, Mehran Mozaffari [2 ]
Azarderakhsh, Reza [3 ]
机构
[1] Marymount Univ, 2807 North Glebe Rd, Arlington, VA 22207 USA
[2] Univ S Florida, 4202 E Fowler Ave, Tampa, FL 33620 USA
[3] Florida Atlant Univ, 777 Glades Rd, Boca Raton, FL 33431 USA
基金
美国国家科学基金会;
关键词
Code-based cryptography; low-power fault detection; McEliece cryptosystem; post-quantum cryptography; ERROR-DETECTION ARCHITECTURES; RING-LWE; MULTIPLICATION; CRYPTOGRAPHY;
D O I
10.1145/3544921
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, lowenergy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solutionwhose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022-2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    COMPUTER NETWORKS, 2022, 217
  • [22] Post-Quantum Cryptosystems: Open Problems and Solutions. Lattice-Based Cryptosystems
    Malygina E.S.
    Kutsenko A.V.
    Novoselov S.A.
    Kolesnikov N.S.
    Bakharev A.O.
    Khilchuk I.S.
    Shaporenko A.S.
    Tokareva N.N.
    Journal of Applied and Industrial Mathematics, 2023, 17 (04) : 767 - 790
  • [23] CRC-Oriented Error Detection Architectures of Post-quantum Cryptography Niederreiter Key Generator on FPGA
    Cintas-Canto, Alvaro
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    Gaj, Kris
    2022 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS), 2022,
  • [24] SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-quantum Encryption Schemes
    Guo, Qian
    Nabokov, Denis
    Nilsson, Alexander
    Johansson, Thomas
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT IV, 2023, 14441 : 203 - 236
  • [25] Security Bounds for the Design of Code-Based Cryptosystems
    Finiasz, Matthieu
    Sendrier, Nicolas
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 88 - 105
  • [26] Efficient and Scalable FPGA Design of GF(2m) Inversion for Post-Quantum Cryptosystems
    Galimberti, Andrea
    Montanaro, Gabriele
    Zoni, Davide
    IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (12) : 3295 - 3307
  • [27] A Classification of Differential Invariants for Multivariate Post-quantum Cryptosystems
    Perlner, Ray
    Smith-Tone, Daniel
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 165 - 173
  • [28] An Algebraic Attack on Rank Metric Code-Based Cryptosystems
    Bardet, Magali
    Briaud, Pierre
    Bros, Maxime
    Gaborit, Philippe
    Neiger, Vincent
    Ruatta, Olivier
    Tillich, Jean-Pierre
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 64 - 93
  • [29] Estimates of Implementation Complexity for Quantum Cryptanalysis of Post-Quantum Lattice-Based Cryptosystems
    Bakharev A.O.
    Journal of Applied and Industrial Mathematics, 2023, 17 (03) : 459 - 482
  • [30] A POST-QUANTUM UC-COMMITMENT SCHEME IN THE GLOBAL RANDOM ORACLE MODEL FROM CODE-BASED ASSUMPTIONS
    Branco, Pedro
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (01) : 113 - 130