Finite Field Arithmetic in Large Characteristic for Classical and Post-quantum Cryptography

被引:0
|
作者
Duquesne, Sylvain [1 ]
机构
[1] Univ Rennes, CNRS, IRMAR UMR 6625, F-35000 Rennes, France
来源
ARITHMETIC OF FINITE FIELDS, WAIFI 2022 | 2023年 / 13638卷
关键词
Finite field; Arithmetic; Cryptography; Modular reduction; Multi precision; Polynomial rings; MODULAR MULTIPLICATION; ALGORITHM; IMPLEMENTATION; OPERATIONS; NUMBERS; CURVES;
D O I
10.1007/978-3-031-22944-2_5
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Both classical and post-quantum cryptography massively use large characteristic finite fields or rings. Consequently, basic arithmetic on these fields or rings (integer or polynomial multiplication, modular reduction) may significantly impact cryptographic devices' efficiency and power consumption. In this paper, we will present the most used and the less common methods, clarify their advantages and drawbacks and explain which ones are the more relevant depending on the implementation context and the chosen cryptographic primitive. We also explain why recent proposals such as RNS, PMNS or Montgomery-friendly primes may be a good alternative to classical methods depending on the context and suggest directions for further research to improve them.
引用
收藏
页码:79 / 106
页数:28
相关论文
共 50 条
  • [1] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [2] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [3] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [4] Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography
    Biasse, J-F
    Bonnetain, X.
    Kirshanova, E.
    Schrottenloher, A.
    Song, F.
    IET INFORMATION SECURITY, 2023, 17 (02) : 171 - 209
  • [5] Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
    Ricci, Sara
    Dobias, Patrik
    Malina, Lukas
    Hajny, Jan
    Jedlicka, Petr
    IEEE ACCESS, 2024, 12 : 23206 - 23219
  • [6] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [7] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [8] Efficient Hardware Implementation of Finite Field Arithmetic AB plus C for Binary Ring-LWE Based Post-Quantum Cryptography
    Xie, Jiafeng
    He, Pengzhou
    Wang, Xiaofang Maggie
    Imana, Jose L.
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 1222 - 1228
  • [9] Post-quantum cryptography and the quantum future of cybersecurity
    Liu, Yi-Kai
    Moody, Dustin
    PHYSICAL REVIEW APPLIED, 2024, 21 (04):
  • [10] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265