Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography

被引:132
|
作者
Longa, Patrick [1 ]
Naehrig, Michael [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
来源
关键词
Post-quantum cryptography; Number Theoretic Transform (NTT); Ring Learning With Errors (R-LWE); Fast modular reduction; Efficient implementation;
D O I
10.1007/978-3-319-48965-0_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and nega-cyclic convolutions, which have many applications in computer arithmetic, e.g., for multiplying large integers and large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With Errors (R-LWE) problem to efficiently implement modular polynomial multiplication. We present a new modular reduction technique that is tailored for the special moduli required by the NTT. Based on this reduction, we speed up the NTT and propose faster, multi-purpose algorithms. We present two implementations of these algorithms: a portable C implementation and a high-speed implementation using assembly with AVX2 instructions. To demonstrate the improved efficiency in an application example, we benchmarked the algorithms in the context of the R-LWE key exchange protocol that has recently been proposed by Alkim, Ducas, Poppelmann and Schwabe. In this case, our C and assembly implementations compute the full key exchange 1.44 and 1.21 times faster, respectively. These results are achieved with full protection against timing attacks.
引用
收藏
页码:124 / 139
页数:16
相关论文
共 50 条
  • [41] Physical Protection of Lattice-Based Cryptography - Challenges and Solutions -
    Khalid, Ayesha
    Oder, Tobias
    Valencia, Felipe
    Neill, Maire O'
    Gueneysu, Tim
    Regazzoni, Francesco
    PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 365 - 370
  • [42] The implementation of polynomial multiplication for lattice-based cryptography: A survey
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Peng, Cong
    Luo, Min
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [43] Computational Differential Privacy from Lattice-Based Cryptography
    Valovich, Filipp
    Alda, Francesco
    NUMBER-THEORETIC METHODS IN CRYPTOLOGY, 2018, 10737 : 121 - 141
  • [44] Flexible NTT Accelerators for RLWE Lattice-based Cryptography
    Nejatollahi, Hamid
    Cammarota, Rosario
    Dutt, Nikil
    2019 IEEE 37TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2019), 2019, : 329 - 332
  • [45] On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Rafferty, Ciara
    Regazzoni, Francesco
    O'Neill, Maire
    IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 322 - 334
  • [46] Security Analysis of Ideal Lattice-based Cryptosystems
    Liu, Zhen
    ACM COMMUNICATIONS IN COMPUTER ALGEBRA, 2021, 55 (03): : 123 - 124
  • [47] Physical Layer Cryptography in Optical Networks: A Lattice-Based Approach
    Boudriga, Noureddine
    Abdallah, Walid
    Hamdi, Mohamed
    2010 12TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2011,
  • [48] Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography
    Howe, James
    Khalid, Ayesha
    Martinoli, Marco
    Regazzoni, Francesco
    Oswald, Elisabeth
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [49] Practical Lattice-Based Cryptography: A Signature Scheme for Embedded Systems
    Gueneysu, Tim
    Lyubashevsky, Vadim
    Poeppelmann, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 530 - 547
  • [50] Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing
    Duman, Julien
    Hovelmanns, Kathrin
    Kiltz, Eike
    Lyubashevsky, Vadim
    Seiler, Gregor
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2722 - 2737