A Unified Cryptoprocessor for Lattice-Based Signature and Key-Exchange

被引:9
|
作者
Aikata, Aikata [1 ]
Mert, Ahmet Can [1 ]
Jacquemin, David [1 ]
Das, Amitabh [2 ]
Matthews, Donald [2 ]
Ghosh, Santosh [3 ]
Roy, Sujoy Sinha [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun, A-8010 Graz, Austria
[2] AMD, Austin, TX 78735 USA
[3] Intel Corp, Intel Labs, Hillsboro, OR 97124 USA
关键词
CRYSTALS-Dilithium; hardware implementation; lattice-based cryptography; post-quantum cryptography; saber;
D O I
10.1109/TC.2022.3215064
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose design methodologies for building a compact, unified and programmable cryptoprocessor architecture that computes post-quantum key agreement and digital signature. Synergies in the two types of cryptographic primitives are used to make the cryptoprocessor compact. As a case study, the cryptoprocessor architecture has been optimized targeting the signature scheme 'CRYSTALS-Dilithium' and the key encapsulation mechanism (KEM) 'Saber,' both finalists in the NIST's post-quantum cryptography standardization project. The programmable cryptoprocessor executes key generations, encapsulations, decapsulations, signature generations, and signature verifications for all the security levels of Dilithium and Saber. On a Xilinx Ultrascale+ FPGA, the proposed cryptoprocessor consumes 18,406 LUTs, 9,323 FFs, 4 DSPs, and 24 BRAMs. It achieves 200 MHz clock frequency and finishes CCA-secure key-generation/encapsulation/decapsulation operations for LightSaber in 29.6/40.4/ 58.3 mu s; for Saber in 54.9/69.7/ 94.9 mu s; and for FireSaber in 87.6/108.0/139.4 mu s, respectively. It finishes key-generation/sign/verify operations for Dilithium-2 in 70.9/ 151.6/75.2 mu s; for Dilithium-3 in 114.7/237/127.6 mu s; and for Dilithium-5 in 194.2/342.1/228.9 mu s, respectively, for the best-case scenario. On UMC 65 nm library for ASIC the latency is improved by a factor of two due to a 2x increase in clock frequency.
引用
收藏
页码:1568 / 1580
页数:13
相关论文
共 50 条
  • [21] A survey on lattice-based digital signature
    Fengxia Liu
    Zhiyong Zheng
    Zixian Gong
    Kun Tian
    Yi Zhang
    Zhe Hu
    Jia Li
    Qun Xu
    Cybersecurity, 7
  • [22] Lattice-based undeniable signature scheme
    Swati Rawal
    Sahadeo Padhye
    Debiao He
    Annals of Telecommunications, 2022, 77 : 119 - 126
  • [23] Efficient KEA-Style Lattice-Based Authenticated Key Exchange
    Wang, Zilong
    Hu, Honggang
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 96 - 109
  • [24] Reconciliation Methods Used in Lattice-Based Key Exchange/Encapsulation Protocols
    Aldeylek, Sedat
    Seyhan, Kubra
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 91 - 96
  • [25] A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
    Seyhan, Kubra
    Akleylek, Sedat
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [26] On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key Exchange
    Greuet, Aurelien
    Montoya, Simon
    Renault, Guenael
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 205 - 227
  • [27] AN IDENTITY-BASED KEY-EXCHANGE PROTOCOL
    GUNTHER, CG
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 29 - 37
  • [28] An Identity-Based Key-Exchange Protocol
    ZHANG Ya-juan
    Wuhan University Journal of Natural Sciences, 2005, (01) : 235 - 238
  • [29] Lattice-based message recovery signature schemes
    Tian, Miaomiao
    Huang, Liusheng
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) : 257 - 269
  • [30] NSS: An NTRU lattice-based Signature Scheme
    Hoffstein, J
    Pipher, J
    Silverman, JH
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 211 - 228