On Using RSA/ECC Coprocessor for Ideal Lattice-Based Key Exchange

نویسندگان

چکیده

Polynomial multiplication is one of the most costly operations ideal lattice-based cryptosystems. In this work, we study its optimizations when operands has coefficients close to 0. We focus on structure since it at core Key Encapsulation Mechanisms submitted NIST call for post-quantum cryptography. particular, propose optimization operation embedded devices by using a RSA/ECC coprocessor that provides efficient and secure large-integer arithmetic. context, compare Kronecker Substitution, already studied in [], with two specific algorithms introduce: KSV, variant substitution, an adaptation schoolbook multiplication, denoted Shift&Add. All these rely transformation polynomial Then, thanks algorithms, existing coprocessors dedicated can be re-purposed order speed-up schemes. The efficiency depends component specifications cryptosystem parameters set. Thus, establish methodology determine which algorithm use, given component, only implementing basic operations. Moreover, three are assessed chip ensuring theoretical matches practical results.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Two-party authenticated key exchange protocol using lattice-based cryptography

Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key to be used for protecting their subsequent communication. Lattice-based cryptographic primitives are believed to provide resilience against attacks from quantum computers. An efficient AKE protoco...

متن کامل

spKEX: An optimized lattice-based key exchange

The advent of large-scale quantum computers has resulted in significant interest in quantum-safe cryptographic primitives. Lattice-based cryptography is one of the most attractive post-quantum cryptographic families due to its well-understood security, efficient operation and versatility. However, LWE-based schemes are still relatively bulky and slow. In this work, we present spKEX, a forward-s...

متن کامل

A Practical Key Exchange for the Internet using Lattice Cryptography

In [21], Peikert presents an efficient and provably secure set of lower level primitives for practical post-quantum cryptography. These primitives also give the first lattice-based scheme to provide perfect forward secrecy, and thus represent a major advancement in providing the same sort of security guarantees that are now expected for modern internet traffic protection. However, the presentat...

متن کامل

Authenticated Key Exchange from Ideal Lattices

In this paper, we present a practical and provably secure two-pass AKE protocol from ideal lattices, which is conceptually simple and has similarities to the Diffie-Hellman based protocols such as HMQV (CRYPTO 2005) and OAKE (CCS 2013). Our protocol does not rely on other cryptographic primitives—in particular, it does not use signatures—simplifying the protocol and resting the security solely ...

متن کامل

Diffie-Hellman type key exchange protocols based on isogenies

‎In this paper‎, ‎we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves‎. ‎The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $‎, ‎is a straightforward generalization of elliptic curve Diffie-Hellman key exchange‎. ‎The method uses commutativity of the endomorphism ring $ End(E) $‎. ‎Then using dual isogenies‎, ‎we propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-89915-8_10