Hardware Implementation of a Polar Code-based Public Key Cryptosystem

12/27/2022
by   Reza Hooshmand, et al.
0

In recent years, there have been many studies on quantum computing and the construction of quantum computers which are capable of breaking conventional number theory-based public key cryptosystems. Therefore, in the not-too-distant future, we need the public key cryptosystems that withstand against the attacks executed by quantum computers, so-called post-quantum cryptosystems. A public key cryptosystem based on polar codes (PKC-PC) has recently been introduced whose security depends on the difficulty of solving the general decoding problem of polar code. In this paper, we first implement the encryption, key generation and decryption algorithms of PKC-PC on Raspberry Pi3. Then, to evaluate its performance, we have measured several related parameters such as execution time, energy consumption, memory consumption and CPU utilization. All these metrics are investigated for encryption/decryption algorithms of PKC-PC with various parameters of polar codes. In the next step, the investigated parameters are compared to the implemented McEliece public key cryptosystem. Analyses of such results show that the execution time of encryption/decryption as well as the energy and memory consumption of PKC-PC is shorter than the McEliece cryptosystem.

READ FULL TEXT

page 10

page 12

page 14

page 16

page 17

research
12/20/2017

PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar Codes

Polar codes are novel and efficient error correcting codes with low enco...
research
12/12/2018

McNie2-Gabidulin: An improvement of McNie public key encryption using Gabidulin code

McNie is a code-based public key encryption scheme submitted as a candid...
research
09/01/2019

Polar Codes and Their Quantum-Domain Counterparts

Arikan's polar codes are capable of achieving the Shannon's capacity at ...
research
03/09/2019

A Lightweight McEliece Cryptosystem Co-processor Design

Due to the rapid advances in the development of quantum computers and th...
research
01/25/2022

Polar Coded Computing: The Role of the Scaling Exponent

We consider the problem of coded distributed computing using polar codes...
research
04/10/2018

A Performance and Resource Consumption Assessment of Secure Multiparty Computation

In recent years, secure multiparty computation (SMC) advanced from a the...
research
11/15/2018

McEliece Cryptosystem Based On Extended Golay Code

With increasing advancements in technology, it is expected that the emer...

Please sign up or login with your details

Forgot password? Click here to reset