Synthesis of Flexible Accelerators for Early Adoption of Ring-LWE Post-quantum Cryptography

被引:9
|
作者
Nejatollahi, Hamid [1 ]
Valencia, Felipe [2 ]
Banik, Subhadeep [3 ]
Regazzoni, Francesco [2 ]
Cammarota, Rosario [4 ]
Dutt, Nikil [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92697 USA
[2] ALaRI, Lugano, Switzerland
[3] Ecole Polytech Fed Lausanne, Lausanne, Switzerland
[4] Intel AI Res, San Diego, CA USA
基金
欧盟地平线“2020”; 瑞士国家科学基金会;
关键词
Public key cryptography; post-quantum cryptography lattice-based cryptography; ideal lattices; domain specific acceleration; cache architecture;
D O I
10.1145/3378164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the quantum computer makes current public-key infrastructure insecure. Cryptography community is addressing this problem by designing, efficiently implementing, and evaluating novel public-key algorithms capable of withstanding quantum computational power. Governmental agencies, such as NIST, are promoting standardization of quantum-resistant algorithms that is expected to run for 7 years. Several modern applications must maintain permanent data secrecy; therefore, they ultimately require the use of quantum-resistant algorithms. Because algorithms are still under scrutiny for eventual standardization, the deployment of the hardware implementation of quantum-resistant algorithms is still in early stages. In this article, we propose a methodology to design programmable hardware accelerators for lattice-based algorithms, and we use the proposed methodology to implement flexible and energy efficient post-quantum cache-based accelerators for NewHope, Kyber, Dilithium, Key Consensus from Lattice (KCL), and R.EMBLEM submissions to the NIST standardization contest. To the best of our knowledge, we propose the first efficient domain-specific, programmable cache-based accelerators for lattice-based algorithms. We design a single accelerator for a common kernel among various schemes with different kernel sizes, i.e., loop count, and data types. This is in contrast to the traditional approach of designing one special purpose accelerators for each scheme. We validate our methodology by integrating our accelerators into an HLS-based SoC infrastructure based on the X86 processor and evaluate overall performance. Our experiments demonstrate the suitability of the approach and allow us to collect insightful information about the performance bottlenecks and the energy efficiency of the explored algorithms. Our results provide guidelines for hardware designers, highlighting the optimization points to address for achieving the highest energy minimization and performance increase. At the same time, our proposed design allows us to specify and execute new variants of lattice-based schemes with superior energy efficiency compared to the main application processor without changing the hardware acceleration platform. For example, we manage to reduce the energy consumption up to 2.1x and energy-delay product (EDP) up to 5.2x and improve the speedup up to 2.5x.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] Post-quantum cryptography for automotive systems
    Fritzmann T.
    Vith J.
    Flórez D.
    Sepúlveda J.
    Microprocessors and Microsystems, 2021, 87
  • [32] Post-Quantum Cryptography in MPSoC Environments
    Sepulveda, Johanna
    Winkler, Dominik
    Sepulveda, Daniel
    Cupelli, Mario
    Olexa, Radek
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 224 - 229
  • [33] Research Trends in Post-quantum Cryptography
    Xagawa, Keita
    NTT Tech. Rev., 2019, 3 (22-26): : 22 - 26
  • [34] Post-quantum cryptography: lattice signatures
    Johannes Buchmann
    Richard Lindner
    Markus Rückert
    Michael Schneider
    Computing, 2009, 85 : 105 - 125
  • [35] Post-Quantum Cryptography for Embedded Systems
    Koziel, Brian
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    2022 IEEE MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC), 2022,
  • [36] Transitioning organizations to post-quantum cryptography
    David Joseph
    Rafael Misoczki
    Marc Manzano
    Joe Tricot
    Fernando Dominguez Pinuaga
    Olivier Lacombe
    Stefan Leichenauer
    Jack Hidary
    Phil Venables
    Royal Hansen
    Nature, 2022, 605 : 237 - 243
  • [37] Recent Developments in Post-Quantum Cryptography
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 3 - 11
  • [38] Transitioning organizations to post-quantum cryptography
    Joseph, David
    Misoczki, Rafael
    Manzano, Marc
    Tricot, Joe
    Pinuaga, Fernando Dominguez
    Lacombe, Olivier
    Leichenauer, Stefan
    Hidary, Jack
    Venables, Phil
    Hansen, Royal
    NATURE, 2022, 605 (7909) : 237 - 243
  • [39] Post-quantum cryptography: lattice signatures
    Buchmann, Johannes
    Lindner, Richard
    Rueckert, Markus
    Schneider, Michael
    COMPUTING, 2009, 85 (1-2) : 105 - 125
  • [40] Post-Quantum Cryptography in WireGuard VPN
    Kniep, Quentin M.
    Mueller, Wolf
    Redlich, Jens-Peter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 261 - 267