Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

Uloženo v:
Podrobná bibliografie
Název: Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
Autoři: Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh
Zdroj: ACM Journal on Emerging Technologies in Computing Systems. 19:1-20
Informace o vydavateli: Association for Computing Machinery (ACM), 2022.
Rok vydání: 2022
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Popis: Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
Druh dokumentu: Article
Jazyk: English
ISSN: 1550-4840
1550-4832
DOI: 10.1145/3544921
Rights: URL: https://www.acm.org/publications/policies/copyright_policy#Background
Přístupové číslo: edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e
Databáze: OpenAIRE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edsair&genre=article&issn=15504840&ISBN=&volume=19&issue=&date=20221209&spage=1&pages=1-20&title=ACM Journal on Emerging Technologies in Computing Systems&atitle=Reliable%20Constructions%20for%20the%20Key%20Generator%20of%20Code-based%20Post-quantum%20Cryptosystems%20on%20FPGA&aulast=Alvaro%20Cintas%20Canto&id=DOI:10.1145/3544921
    Name: Full Text Finder
    Category: fullText
    Text: Full Text Finder
    Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif
    MouseOverText: Full Text Finder
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Canto%20AC
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsair
DbLabel: OpenAIRE
An: edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e
RelevancyScore: 927
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 926.888488769531
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Alvaro+Cintas+Canto%22">Alvaro Cintas Canto</searchLink><br /><searchLink fieldCode="AR" term="%22Mehran+Mozaffari+Kermani%22">Mehran Mozaffari Kermani</searchLink><br /><searchLink fieldCode="AR" term="%22Reza+Azarderakhsh%22">Reza Azarderakhsh</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: <i>ACM Journal on Emerging Technologies in Computing Systems</i>. 19:1-20
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: Association for Computing Machinery (ACM), 2022.
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2022
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%220202+electrical+engineering%2C+electronic+engineering%2C+information+engineering%22">0202 electrical engineering, electronic engineering, information engineering</searchLink><br /><searchLink fieldCode="DE" term="%2202+engineering+and+technology%22">02 engineering and technology</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: Article
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: ISSN
  Label: ISSN
  Group: ISSN
  Data: 1550-4840<br />1550-4832
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.1145/3544921
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: URL: https://www.acm.org/publications/policies/copyright_policy#Background
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsair&AN=edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.1145/3544921
    Languages:
      – Text: English
    PhysicalDescription:
      Pagination:
        PageCount: 20
        StartPage: 1
    Subjects:
      – SubjectFull: 0202 electrical engineering, electronic engineering, information engineering
        Type: general
      – SubjectFull: 02 engineering and technology
        Type: general
    Titles:
      – TitleFull: Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Alvaro Cintas Canto
      – PersonEntity:
          Name:
            NameFull: Mehran Mozaffari Kermani
      – PersonEntity:
          Name:
            NameFull: Reza Azarderakhsh
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 09
              M: 12
              Type: published
              Y: 2022
          Identifiers:
            – Type: issn-print
              Value: 15504840
            – Type: issn-print
              Value: 15504832
            – Type: issn-locals
              Value: edsair
          Numbering:
            – Type: volume
              Value: 19
          Titles:
            – TitleFull: ACM Journal on Emerging Technologies in Computing Systems
              Type: main
ResultId 1