An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms

Security of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have invest...

Full description

Bibliographic Details
Main Authors: Malik Imran, Zain Ul Abideen, Samuel Pagliarini
Format: Article
Language:English
Published: MDPI AG 2020-11-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/9/11/1953
id doaj-4318f9afa5ae46e1b08501f796fb4650
record_format Article
spelling doaj-4318f9afa5ae46e1b08501f796fb46502020-11-25T04:11:20ZengMDPI AGElectronics2079-92922020-11-0191953195310.3390/electronics9111953An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic AlgorithmsMalik Imran0Zain Ul Abideen1Samuel Pagliarini2Centre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaCentre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaCentre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaSecurity of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware. To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks. We assume the algorithms will be implemented in an application-specific integrated circuit (ASIC) platform and the targeted technology is 65 nm. To estimate the characteristics of each algorithm, we have assessed the following characteristics: memory requirements, use of multipliers, and use of hashing functions. Furthermore, for these building blocks, we have collected area and power figures for all studied algorithms by making use of commercial memory compilers and standard cells. Our results reveal interesting insights about the relative importance of each building block for the overall cryptosystem, which can be used for guiding ASIC designers when selecting an algorithm or when deciding where to focus optimization efforts such that the final design respects requirements and design constraints.https://www.mdpi.com/2079-9292/9/11/1953post-quantum cryptographyNIST PQC algorithmscrypto-hardwarePQC building blocks
collection DOAJ
language English
format Article
sources DOAJ
author Malik Imran
Zain Ul Abideen
Samuel Pagliarini
spellingShingle Malik Imran
Zain Ul Abideen
Samuel Pagliarini
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
Electronics
post-quantum cryptography
NIST PQC algorithms
crypto-hardware
PQC building blocks
author_facet Malik Imran
Zain Ul Abideen
Samuel Pagliarini
author_sort Malik Imran
title An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
title_short An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
title_full An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
title_fullStr An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
title_full_unstemmed An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
title_sort experimental study of building blocks of lattice-based nist post-quantum cryptographic algorithms
publisher MDPI AG
series Electronics
issn 2079-9292
publishDate 2020-11-01
description Security of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware. To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks. We assume the algorithms will be implemented in an application-specific integrated circuit (ASIC) platform and the targeted technology is 65 nm. To estimate the characteristics of each algorithm, we have assessed the following characteristics: memory requirements, use of multipliers, and use of hashing functions. Furthermore, for these building blocks, we have collected area and power figures for all studied algorithms by making use of commercial memory compilers and standard cells. Our results reveal interesting insights about the relative importance of each building block for the overall cryptosystem, which can be used for guiding ASIC designers when selecting an algorithm or when deciding where to focus optimization efforts such that the final design respects requirements and design constraints.
topic post-quantum cryptography
NIST PQC algorithms
crypto-hardware
PQC building blocks
url https://www.mdpi.com/2079-9292/9/11/1953
work_keys_str_mv AT malikimran anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
AT zainulabideen anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
AT samuelpagliarini anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
AT malikimran experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
AT zainulabideen experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
AT samuelpagliarini experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms
_version_ 1724418084895195136