Abstract

This paper presents a review of module ring learning with errors-based (MLWE-based) public-key encryption and key-establishment algorithms. In particular, we introduce the preliminaries of public key cryptography, MLWE-based algorithms, and arithmetic operations in post-quantum cryptography. We then focus on analyzing the state-of-the-art hardware architecture designs of CRYSTALS-Kyber at different security levels, including hardware architectures for Kyber-512, Kyber-768, and Kyber-1024. This analysis is dedicated to providing complete guidelines for selecting the most suitable CRYSTALS-Kyber hardware architecture to apply in post-quantum cryptography-based security systems in reality, with different requirements of security levels and hardware efficiency.

Highlights

  • Cryptography is broadly categorized into symmetric key cryptography and asymmetric key cryptography

  • In [18], the authors of the CRYSTALS-Kyber algorithm mentioned that Kyber helps to reduce structure and offers much better scalability compared to ring-Learning with errors (LWE)

  • We summarize the CRYSTALS-Kyber public-key encryption and keyestablishment algorithms

Read more

Summary

Introduction

Cryptography is broadly categorized into symmetric key cryptography and asymmetric key cryptography (or public key cryptography). While the private key is kept secret to use in the decryption operation, the public key is published to everyone and used in the encryption operation. The RSA algorithm is the earliest public key cryptographic algorithm developed and published for commercial use. It is widespread and has been integrated in both Netscape Web and Microsoft browsers to provide security solutions for e-commerce applications. In [18], the authors of the CRYSTALS-Kyber algorithm mentioned that Kyber helps to reduce structure and offers much better scalability compared to ring-LWE. We summarize the CRYSTALS-Kyber public-key encryption and keyestablishment algorithms. We present an analysis of the state-of-the-art implementations of CRYSTALS-Kyber in pure software, software and hardware codesign, and pure hardware.

Background
Public-Key Encryption Algorithm
Key-Establishment Algorithm
Arithmetic Operations in CRYSTALS-Kyber
Implementation of CRYSTALS-Kyber
Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call