z-logo
open-access-imgOpen Access
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
Author(s) -
Tim Fritzmann,
Michiel Van Beirendonck,
Debapriya Basu Roy,
Patrick Karl,
Thomas Schamberger,
Ingrid Verbauwhede,
Georg Sigl
Publication year - 2021
Publication title -
iacr transactions on cryptographic hardware and embedded systems
Language(s) - English
Resource type - Journals
ISSN - 2569-2925
DOI - 10.46586/tches.v2022.i1.414-460
Subject(s) - computer science , cryptography , cryptanalysis , nist , side channel attack , quantum cryptography , theoretical computer science , computer engineering , algorithm , quantum , quantum information , physics , quantum mechanics , natural language processing
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography. While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, a cost analysis of efficient side-channel countermeasures is still lacking. In this work, we propose a masked HW/SW codesign of the NIST PQC finalists Kyber and Saber, suitable for their different characteristics. Among others, we present a novel masked ciphertext compression algorithm for non-power-of-two moduli. To accelerate linear performance bottlenecks, we developed a generic Number Theoretic Transform (NTT) multiplier, which, in contrast to previously published accelerators, is also efficient and suitable for schemes not based on NTT. For the critical non-linear operations, masked HW accelerators were developed, allowing a secure execution using RISC-V instruction set extensions. With the proposed design, we achieved a cycle count of K:214k/E:298k/D:313k for Kyber and K:233k/E:312k/D:351k for Saber with NIST Level III parameter sets. For the same parameter sets, the masking overhead for the first-order secure decapsulation operation including randomness generation is a factor of 4.48 for Kyber (D:1403k)and 2.60 for Saber (D:915k).

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here