A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange

10/13/2022
by   Aikata Aikata, et al.
0

We propose design methodologies for building a compact, unified and programmable cryptoprocessor architecture that computes post-quantum key agreement and digital signature. Synergies in the two types of cryptographic primitives are used to make the cryptoprocessor compact. As a case study, the cryptoprocessor architecture has been optimized targeting the signature scheme 'CRYSTALS-Dilithium' and the key encapsulation mechanism (KEM) 'Saber', both finalists in the NIST's post-quantum cryptography standardization project. The programmable cryptoprocessor executes key generations, encapsulations, decapsulations, signature generations, and signature verifications for all the security levels of Dilithium and Saber. On a Xilinx Ultrascale+ FPGA, the proposed cryptoprocessor consumes 18,406 LUTs, 9,323 FFs, 4 DSPs, and 24 BRAMs. It achieves 200 MHz clock frequency and finishes CCA-secure key-generation/encapsulation/decapsulation operations for LightSaber in 29.6/40.4/58.3μs; for Saber in 54.9/69.7/94.9μs; and for FireSaber in 87.6/108.0/139.4μs, respectively. It finishes key-generation/sign/verify operations for Dilithium-2 in 70.9/151.6/75.2μs; for Dilithium-3 in 114.7/237/127.6μs; and for Dilithium-5 in 194.2/342.1/228.9μs, respectively, for the best-case scenario. On UMC 65nm library for ASIC the latency is improved by a factor of two due to a 2x increase in clock frequency.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2023

Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies

Current solutions to quantum vulnerabilities of widely used cryptographi...
research
03/15/2023

Cryptographic Primitives based on Compact Knapsack Problem

In the present paper, we extend previous results of an id scheme based o...
research
09/16/2021

Design Space Exploration of SABER in 65nm ASIC

This paper presents a design space exploration for SABER, one of the fin...
research
04/12/2021

Entropoid Based Cryptography

By analogy with the developed cryptographic theory of discrete logarithm...
research
06/03/2023

Optimized Vectorization Implementation of CRYSTALS-Dilithium

CRYSTALS-Dilithium is a lattice-based signature scheme to be standardize...
research
03/05/2023

A Provably Secure Strong PUF based on LWE: Construction and Implementation

We construct a strong PUF with provable security against ML attacks on b...
research
08/12/2023

PQC-HA: A Framework for Prototyping and In-Hardware Evaluation of Post-Quantum Cryptography Hardware Accelerators

In the third round of the NIST Post-Quantum Cryptography standardization...

Please sign up or login with your details

Forgot password? Click here to reset