Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA
Uloženo v:
| Název: | Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA |
|---|---|
| Autoři: | Alvaro Cintas Canto, Mehran Mozaffari Kermani, Reza Azarderakhsh |
| Zdroj: | ACM Journal on Emerging Technologies in Computing Systems. 19:1-20 |
| Informace o vydavateli: | Association for Computing Machinery (ACM), 2022. |
| Rok vydání: | 2022 |
| Témata: | 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology |
| Popis: | Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed. |
| Druh dokumentu: | Article |
| Jazyk: | English |
| ISSN: | 1550-4840 1550-4832 |
| DOI: | 10.1145/3544921 |
| Rights: | URL: https://www.acm.org/publications/policies/copyright_policy#Background |
| Přístupové číslo: | edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e |
| Databáze: | OpenAIRE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edsair&genre=article&issn=15504840&ISBN=&volume=19&issue=&date=20221209&spage=1&pages=1-20&title=ACM Journal on Emerging Technologies in Computing Systems&atitle=Reliable%20Constructions%20for%20the%20Key%20Generator%20of%20Code-based%20Post-quantum%20Cryptosystems%20on%20FPGA&aulast=Alvaro%20Cintas%20Canto&id=DOI:10.1145/3544921 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Canto%20AC Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsair DbLabel: OpenAIRE An: edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e RelevancyScore: 927 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 926.888488769531 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Alvaro+Cintas+Canto%22">Alvaro Cintas Canto</searchLink><br /><searchLink fieldCode="AR" term="%22Mehran+Mozaffari+Kermani%22">Mehran Mozaffari Kermani</searchLink><br /><searchLink fieldCode="AR" term="%22Reza+Azarderakhsh%22">Reza Azarderakhsh</searchLink> – Name: TitleSource Label: Source Group: Src Data: <i>ACM Journal on Emerging Technologies in Computing Systems</i>. 19:1-20 – Name: Publisher Label: Publisher Information Group: PubInfo Data: Association for Computing Machinery (ACM), 2022. – Name: DatePubCY Label: Publication Year Group: Date Data: 2022 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%220202+electrical+engineering%2C+electronic+engineering%2C+information+engineering%22">0202 electrical engineering, electronic engineering, information engineering</searchLink><br /><searchLink fieldCode="DE" term="%2202+engineering+and+technology%22">02 engineering and technology</searchLink> – Name: Abstract Label: Description Group: Ab Data: Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed. – Name: TypeDocument Label: Document Type Group: TypDoc Data: Article – Name: Language Label: Language Group: Lang Data: English – Name: ISSN Label: ISSN Group: ISSN Data: 1550-4840<br />1550-4832 – Name: DOI Label: DOI Group: ID Data: 10.1145/3544921 – Name: Copyright Label: Rights Group: Cpyrght Data: URL: https://www.acm.org/publications/policies/copyright_policy#Background – Name: AN Label: Accession Number Group: ID Data: edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsair&AN=edsair.doi...........e62c635ca7bbb439ab833f2b0be7235e |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1145/3544921 Languages: – Text: English PhysicalDescription: Pagination: PageCount: 20 StartPage: 1 Subjects: – SubjectFull: 0202 electrical engineering, electronic engineering, information engineering Type: general – SubjectFull: 02 engineering and technology Type: general Titles: – TitleFull: Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Alvaro Cintas Canto – PersonEntity: Name: NameFull: Mehran Mozaffari Kermani – PersonEntity: Name: NameFull: Reza Azarderakhsh IsPartOfRelationships: – BibEntity: Dates: – D: 09 M: 12 Type: published Y: 2022 Identifiers: – Type: issn-print Value: 15504840 – Type: issn-print Value: 15504832 – Type: issn-locals Value: edsair Numbering: – Type: volume Value: 19 Titles: – TitleFull: ACM Journal on Emerging Technologies in Computing Systems Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science