An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms
Security of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have invest...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-11-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/11/1953 |
id |
doaj-4318f9afa5ae46e1b08501f796fb4650 |
---|---|
record_format |
Article |
spelling |
doaj-4318f9afa5ae46e1b08501f796fb46502020-11-25T04:11:20ZengMDPI AGElectronics2079-92922020-11-0191953195310.3390/electronics9111953An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic AlgorithmsMalik Imran0Zain Ul Abideen1Samuel Pagliarini2Centre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaCentre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaCentre for Hardware Security, Tallinn University of Technology (TalTech), 12616 Tallinn, EstoniaSecurity of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware. To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks. We assume the algorithms will be implemented in an application-specific integrated circuit (ASIC) platform and the targeted technology is 65 nm. To estimate the characteristics of each algorithm, we have assessed the following characteristics: memory requirements, use of multipliers, and use of hashing functions. Furthermore, for these building blocks, we have collected area and power figures for all studied algorithms by making use of commercial memory compilers and standard cells. Our results reveal interesting insights about the relative importance of each building block for the overall cryptosystem, which can be used for guiding ASIC designers when selecting an algorithm or when deciding where to focus optimization efforts such that the final design respects requirements and design constraints.https://www.mdpi.com/2079-9292/9/11/1953post-quantum cryptographyNIST PQC algorithmscrypto-hardwarePQC building blocks |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Malik Imran Zain Ul Abideen Samuel Pagliarini |
spellingShingle |
Malik Imran Zain Ul Abideen Samuel Pagliarini An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms Electronics post-quantum cryptography NIST PQC algorithms crypto-hardware PQC building blocks |
author_facet |
Malik Imran Zain Ul Abideen Samuel Pagliarini |
author_sort |
Malik Imran |
title |
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
title_short |
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
title_full |
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
title_fullStr |
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
title_full_unstemmed |
An Experimental Study of Building Blocks of Lattice-Based NIST Post-Quantum Cryptographic Algorithms |
title_sort |
experimental study of building blocks of lattice-based nist post-quantum cryptographic algorithms |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2020-11-01 |
description |
Security of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standardization competition. In this work, we have investigated how lattice-based candidate algorithms fare when implemented in hardware. To achieve this, we have assessed 12 lattice-based algorithms in order to identify their basic building blocks. We assume the algorithms will be implemented in an application-specific integrated circuit (ASIC) platform and the targeted technology is 65 nm. To estimate the characteristics of each algorithm, we have assessed the following characteristics: memory requirements, use of multipliers, and use of hashing functions. Furthermore, for these building blocks, we have collected area and power figures for all studied algorithms by making use of commercial memory compilers and standard cells. Our results reveal interesting insights about the relative importance of each building block for the overall cryptosystem, which can be used for guiding ASIC designers when selecting an algorithm or when deciding where to focus optimization efforts such that the final design respects requirements and design constraints. |
topic |
post-quantum cryptography NIST PQC algorithms crypto-hardware PQC building blocks |
url |
https://www.mdpi.com/2079-9292/9/11/1953 |
work_keys_str_mv |
AT malikimran anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms AT zainulabideen anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms AT samuelpagliarini anexperimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms AT malikimran experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms AT zainulabideen experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms AT samuelpagliarini experimentalstudyofbuildingblocksoflatticebasednistpostquantumcryptographicalgorithms |
_version_ |
1724418084895195136 |