Abstract

The fast development of quantum computers represents a risk for secure communications. Current traditional public-key cryptography will not withstand attacks performed on quantum computers. In order to prepare for such a quantum threat, electronic systems must integrate efficient and secure post-quantum cryptography which is able to meet the different application requirements and to resist implementation attacks. The NTRU cryptosystem is one of the main candidates for practical implementations of post-quantum public-key cryptography. The standardized version of NTRU (IEEE-1363.1) provides security against a large range of attacks through a special padding scheme. So far, NTRU hardware and software solutions have been proposed. However, the hardware solutions do not include the padding scheme or they use optimized architectures that lead to a degradation of the security level. In addition, NTRU software implementations are flexible but most of the time present a low performance when compared to hardware solutions. In this work, for the first time, we present a hardware/software co-design approach compliant with the IEEE-1363.1 standard. Our solution takes advantage of the flexibility of the software NTRU implementation and the speedup due to the hardware accelerator specially designed in this work. Furthermore, we provide a refined security reduction analysis of an optimized NTRU hardware implementation presented in a previous work.

Highlights

  • Public-key cryptography (PKC) provides the basis for establishing secured communication channels between multiple parties

  • Previous works in NTRU hardware implementations focused on the development of a fast polynomial multiplication architecture

  • For the first time, we propose a full hardware/software implementation that is compliant with the IEEE-1363.1 standard

Read more

Summary

Introduction

Public-key cryptography (PKC) provides the basis for establishing secured communication channels between multiple parties. This work extends our previous contribution presented in [4], where we demonstrate the first complete, compact, and secure NTRU hardware implementation and show that the optimized NTRU implementation in [16] exhibits a timing side-channel by giving a bounded security reduction analysis. In this extended work, we present the first HW/SW co-design NTRU solution compliant with the IEEE 1363.1 standard. We present the first HW/SW co-design NTRU solution compliant with the IEEE 1363.1 standard It takes advantage of the flexibility of the software implementation and the speedup through the design of a specific hardware accelerator.

Related Works
Notation
Short Vector Encryption Scheme (SVES)
NTRU with SVES
NTRU Full Hardware Architecture
Convolution (CONV )
Blinding Polynomial Generation Method (BPGM )
Mask Generation Function (MGF)
Modulo Reduction (MOD p)
Software Implementation
Security Analysis
Optimized Architecture
Vulnerabilities
Results
Results of Full Hardware Implementation
Results of HW/SW Co-Design
Conclusion
19. National Institute of Standards and Technology
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.