Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems

نویسندگان

چکیده

The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the evaluated by NIST third round its PQC contest was NTRU cryptosystem. main drawback algorithm is enormous amount time required for multiplication polynomials both encryption and decryption processes. Therefore, strategy speeding up using hardware/software co-design techniques where operation executed on specific hardware arises. Using these techniques, work focuses acceleration polynomial process resource-constrained devices. For purpose, several multiplications are analyzed following different strategies, taking into account fact that there no possible timing information leaks available resources optimized as much possible. designed multiplier encapsulated a fully reusable parametrizable IP module standard AXI4-Stream interconnection buses, which makes it easy to integrate embedded systems implemented programmable devices from manufacturers. Depending resource constraints imposed, accelerations 30–45 times respect software-level runtime can be achieved dedicated hardware, device occupancy around 5%.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Imperfect Decryption and an Attack on the NTRU Encryption Scheme

A property of the NTRU public-key cryptosystem is that it does not provide perfect decryption. That is, given an instance of the cryptosystem, there exist ciphertexts which can be validly created using the public key but which can’t be decrypted using the private key. The valid ciphertexts which an NTRU secret key will not correctly decipher determine, up to a cyclic shift, the secret key. In t...

متن کامل

Resource−Constrained Embedded Control and Computing Systems

This thesis deals with methods for handling resource constraints in embedded control systems and real-time computing systems. By dynamic feedback-based resource scheduling it is possible to achieve adaptability and increased performance for these systems. A feedback scheduling strategy is presented, which uses feedback from plant states to distribute computing resources optimally among a set of...

متن کامل

QTRU: A Lattice Attack Resistant Version of NTRU

We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors in each encryption session and the only other major difference between NTRU and QTRU is that the underlying algebraic structure has been changed to a non-commutative algebraic structure. As a result, QTRU inherits the ...

متن کامل

Fuzzy Feedback Scheduling of Resource-Constrained Embedded Control Systems

The quality of control (QoC) of a resource-constrained embedded control system may be jeopardized in dynamic environments with variable workload. This gives rise to the increasing demand of co-design of control and scheduling. To deal with uncertainties in resource availability, a fuzzy feedback scheduling (FFS) scheme is proposed in this paper. Within the framework of feedback scheduling, the ...

متن کامل

Dynamic Software Update of Resource-Constrained Distributed Embedded Systems

Changing demands, software evolution, and bug fixes require the possibility to update applications as well as system software of embedded devices. Systems that perform updates of resource-constrained nodes are available, but most approaches require a complete restart of the node after installing or updating software. Restarting the node results in the loss of important system state, such as rou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography

سال: 2023

ISSN: ['2410-387X']

DOI: https://doi.org/10.3390/cryptography7020029