Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography

被引:132
|
作者
Longa, Patrick [1 ]
Naehrig, Michael [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
来源
关键词
Post-quantum cryptography; Number Theoretic Transform (NTT); Ring Learning With Errors (R-LWE); Fast modular reduction; Efficient implementation;
D O I
10.1007/978-3-319-48965-0_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and nega-cyclic convolutions, which have many applications in computer arithmetic, e.g., for multiplying large integers and large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With Errors (R-LWE) problem to efficiently implement modular polynomial multiplication. We present a new modular reduction technique that is tailored for the special moduli required by the NTT. Based on this reduction, we speed up the NTT and propose faster, multi-purpose algorithms. We present two implementations of these algorithms: a portable C implementation and a high-speed implementation using assembly with AVX2 instructions. To demonstrate the improved efficiency in an application example, we benchmarked the algorithms in the context of the R-LWE key exchange protocol that has recently been proposed by Alkim, Ducas, Poppelmann and Schwabe. In this case, our C and assembly implementations compute the full key exchange 1.44 and 1.21 times faster, respectively. These results are achieved with full protection against timing attacks.
引用
收藏
页码:124 / 139
页数:16
相关论文
共 50 条
  • [31] High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers
    Liu, Zhe
    Poeppelmann, Thomas
    Oder, Tobias
    Seo, Hwajeong
    Roy, Sujoy Sinha
    Gueneysu, Tim
    Grossschaedl, Johann
    Kim, Howon
    Verbauwhede, Ingrid
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (04)
  • [32] Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs
    Yu, Tianrun
    Cheng, Chi
    Yang, Zilong
    Wang, Yingchen
    Pan, Yanbin
    Weng, Jian
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (03): : 200 - 223
  • [33] Towards Efficient Polynomial Multiplication for Lattice-Based Cryptography
    Du, Chaohui
    Bai, Guoqiang
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1178 - 1181
  • [34] Efficient key revocation in WSN with lattice-based cryptography
    Khan, Ihtiram Raza
    Gupta, Neha
    Hundekari, Sheela
    Bansal, Ashish
    Mahajan, Rupali Atul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 339 - 348
  • [35] Heuristics and Rigor in Lattice-Based Cryptography (Invited Talk)
    Peikert, Chris
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 54 - 54
  • [36] Combined Fault and DPA Protection for Lattice-Based Cryptography
    Heinz, Daniel
    Poeppelmann, Thomas
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (04) : 1055 - 1066
  • [37] TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator
    Wan, Lipeng
    Zheng, Fangyu
    Li, Jingqiang
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 249 - 269
  • [38] Lattice-Based Cryptography: from Reconfigurable Hardware to ASIC
    Oder, Tobias
    Gueneysu, Tim
    Valencia, Felipe
    Khalid, Ayesha
    O'Neill, Maire
    Regazzoni, Francesco
    2016 INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2016,
  • [39] Portable Implementation of Lattice-Based Cryptography Using JavaScript
    20161902341243
    (1) Graduate School of Mathematics, Kyushu University, Japan; (2) Institute of Mathematics for Industry, Kyushu University, Japan; (3) Department of Electrical Engineering, National Taiwan University, Taiwan; (4) KDDI Laboratories, Taiwan; (5) CREST, Japan Science and Technology Agency, Japan, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [40] Efficient Implementation of HashSieve Algorithm for Lattice-Based Cryptography
    Satilmis, Hami
    Akleylek, Sedat
    2020 INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCTURKEY 2020), 2020, : 75 - 79