Synthesis of Flexible Accelerators for Early Adoption of Ring-LWE Post-quantum Cryptography

被引:9
|
作者
Nejatollahi, Hamid [1 ]
Valencia, Felipe [2 ]
Banik, Subhadeep [3 ]
Regazzoni, Francesco [2 ]
Cammarota, Rosario [4 ]
Dutt, Nikil [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92697 USA
[2] ALaRI, Lugano, Switzerland
[3] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[4] Intel AI Res, San Diego, CA USA
基金
欧盟地平线“2020”; 瑞士国家科学基金会;
关键词
Public key cryptography; post-quantum cryptography lattice-based cryptography; ideal lattices; domain specific acceleration; cache architecture;
D O I
10.1145/3378164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the quantum computer makes current public-key infrastructure insecure. Cryptography community is addressing this problem by designing, efficiently implementing, and evaluating novel public-key algorithms capable of withstanding quantum computational power. Governmental agencies, such as NIST, are promoting standardization of quantum-resistant algorithms that is expected to run for 7 years. Several modern applications must maintain permanent data secrecy; therefore, they ultimately require the use of quantum-resistant algorithms. Because algorithms are still under scrutiny for eventual standardization, the deployment of the hardware implementation of quantum-resistant algorithms is still in early stages. In this article, we propose a methodology to design programmable hardware accelerators for lattice-based algorithms, and we use the proposed methodology to implement flexible and energy efficient post-quantum cache-based accelerators for NewHope, Kyber, Dilithium, Key Consensus from Lattice (KCL), and R.EMBLEM submissions to the NIST standardization contest. To the best of our knowledge, we propose the first efficient domain-specific, programmable cache-based accelerators for lattice-based algorithms. We design a single accelerator for a common kernel among various schemes with different kernel sizes, i.e., loop count, and data types. This is in contrast to the traditional approach of designing one special purpose accelerators for each scheme. We validate our methodology by integrating our accelerators into an HLS-based SoC infrastructure based on the X86 processor and evaluate overall performance. Our experiments demonstrate the suitability of the approach and allow us to collect insightful information about the performance bottlenecks and the energy efficiency of the explored algorithms. Our results provide guidelines for hardware designers, highlighting the optimization points to address for achieving the highest energy minimization and performance increase. At the same time, our proposed design allows us to specify and execute new variants of lattice-based schemes with superior energy efficiency compared to the main application processor without changing the hardware acceleration platform. For example, we manage to reduce the energy consumption up to 2.1x and energy-delay product (EDP) up to 5.2x and improve the speedup up to 2.5x.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
    Ortiz, Jheyne N.
    de Araujo, Robson R.
    Aranha, Diego F.
    Costa, Sueli I. R.
    Dahab, Ricardo
    ENTROPY, 2021, 23 (09)
  • [22] High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
    Tuy Nguyen Tan
    Lee, Hanho
    IEEE ACCESS, 2019, 7 : 23379 - 23387
  • [23] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [24] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [25] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [26] EasyPQC: Verifying Post-Quantum Cryptography
    Barbosa, Manuel
    Barthe, Gilles
    Fan, Xiong
    Gregoire, Benjamin
    Hung, Shih-Han
    Katz, Jonathan
    Strub, Pierre-Yves
    Wu, Xiaodi
    Zhou, Li
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2564 - 2586
  • [27] A Mathematical Perspective on Post-Quantum Cryptography
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Tschache, Alexander
    MATHEMATICS, 2022, 10 (15)
  • [28] Implementing Post-quantum Cryptography for Developers
    Hekkala J.
    Muurman M.
    Halunen K.
    Vallivaara V.
    SN Computer Science, 4 (4)
  • [29] Post-Quantum Cryptography in Embedded Systems
    Marzougui, Soundes
    Kraemer, Juliane
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [30] Benchmarking Post-quantum Cryptography in TLS
    Paquin, Christian
    Stebila, Douglas
    Tamvada, Goutam
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 72 - 91