On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography

被引:49
|
作者
Howe, James [1 ]
Khalid, Ayesha [1 ]
Rafferty, Ciara [1 ]
Regazzoni, Francesco [2 ]
O'Neill, Maire [1 ]
机构
[1] Queens Univ Belfast, CSIT, Belfast BT7 1NN, Antrim, North Ireland
[2] Univ Svizzera Italiana, Adv Learning & Res Inst, CH-6900 Lugano, Switzerland
基金
英国工程与自然科学研究理事会;
关键词
Lattice-based cryptography; post-quantum cryptography; discrete Gaussian sampling; hardware security; cryptography;
D O I
10.1109/TC.2016.2642962
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lattice-based cryptography is one of the most promising branches of quantum resilient cryptography, offering versatility and efficiency. Discrete Gaussian samplers are a core building block in most, if not all, lattice-based cryptosystems, and optimised samplers are desirable both for high-speed and low-area applications. Due to the inherent structure of existing discrete Gaussian sampling methods, lattice-based cryptosystems are vulnerable to side-channel attacks, such as timing analysis. In this paper, the first comprehensive evaluation of discrete Gaussian samplers in hardware is presented, targeting FPGA devices. Novel optimised discrete Gaussian sampler hardware architectures are proposed for the main sampling techniques. An independent-time design of each of the samplers is presented, offering security against side-channel timing attacks, including the first proposed constant-time Bernoulli, Knuth-Yao, and discrete Ziggurat sampler hardware designs. For a balanced performance, the Cumulative Distribution Table (CDT) sampler is recommended, with the proposed hardware CDT design achieving a throughput of 59.4 million samples per second for encryption, utilising just 43 slices on a Virtex 6 FPGA and 16.3 million samples per second for signatures with 179 slices on a Spartan 6 device.
引用
收藏
页码:322 / 334
页数:13
相关论文
共 50 条
  • [41] ProgramGalois: A Programmable Generator of Radix-4 Discrete Galois Transformation Architecture for Lattice-Based Cryptography
    Li, Guangyan
    Ye, Zewen
    Chen, Donglong
    Dai, Wangchen
    Mao, Gaoyu
    Huang, Kejie
    Cheung, Ray C. C.
    [J]. ACM Transactions on Reconfigurable Technology and Systems, 2024, 17 (04)
  • [42] Physical Layer Cryptography in Optical Networks: A Lattice-Based Approach
    Boudriga, Noureddine
    Abdallah, Walid
    Hamdi, Mohamed
    [J]. 2010 12TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,
  • [43] Practical Lattice-Based Multisignature Schemes for Blockchains
    Ma, Changshe
    Jiang, Mei
    [J]. IEEE ACCESS, 2019, 7 : 179765 - 179778
  • [44] Practical Lattice-Based Digital Signature Schemes
    Howe, James
    Poeppelmann, Thomas
    O'Neill, Maire
    O'Sullivan, Elizabeth
    Gueneysu, Tim
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2015, 14 (03)
  • [45] Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    Lee, Cheng-Chi
    [J]. MATHEMATICS, 2021, 9 (14)
  • [46] A Practical Lattice-Based Sequential Aggregate Signature
    Wang, Zhipeng
    Wu, Qianhong
    [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 94 - 109
  • [47] Exploring Energy Efficient Architectures for RLWE Lattice-Based Cryptography
    Nejatollahi, Hamid
    Shahhosseini, Sina
    Cammarota, Rosario
    Dutt, Nikil
    [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2021, 93 (10): : 1139 - 1148
  • [48] Portable Implementation of Lattice-based Cryptography using Java']JavaScript
    Yuan, Ye
    Cheng, Chen-Mou
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    Takagi, Tsuyoshi
    [J]. PROCEEDINGS OF 2015 THIRD INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2015, : 58 - 67
  • [49] Attacking and defending masked polynomial comparison for lattice-based cryptography
    Bhasin, Shivam
    D’anvers, Jan-Pieter
    Heinz, Daniel
    Pöppelmann, Thomas
    Van Beirendonck, Michiel
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2021, 2021 (03): : 334 - 359
  • [50] Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography
    格密码关键运算模块的硬件实现优化与评估
    [J]. Ma, Yuan (mayuan@iie.ac.cn), 2021, Peking University (57): : 595 - 604