An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === In this paper, we present an ASIC implementation of two post-quantum publickey cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/07908260015637663085 |
id |
ndltd-TW-100NTU05442080 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NTU054420802015-10-13T21:50:19Z http://ndltd.ncl.edu.tw/handle/07908260015637663085 An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography 格向量及多變量後量子密碼系統實作 Jie-Ren Shih 施傑仁 碩士 國立臺灣大學 電機工程學研究所 100 In this paper, we present an ASIC implementation of two post-quantum publickey cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too "expensive" for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-e cient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more e cient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications. 鄭振牟 2012 學位論文 ; thesis 37 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === In this paper, we present an ASIC implementation of two post-quantum publickey
cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward
securing M2M systems using strong, hardware-assisted PKC. In contrast to
the conventional wisdom that PKC is too "expensive" for M2M sensors, it actually
can lower the total cost of ownership because of cost savings in provision, deployment,
operation, maintenance, and general management. Furthermore, PKC can
be more energy-e cient because PKC-based security protocols usually involve less
communication than their symmetric-key-based counterparts, and communication
is getting relatively more and more expensive compared with computation. More
importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt
and TTS included, that are orders of magnitude more e cient than traditional
PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the
feasibility of using hardware-based PKC to provide general data security in M2M
applications.
|
author2 |
鄭振牟 |
author_facet |
鄭振牟 Jie-Ren Shih 施傑仁 |
author |
Jie-Ren Shih 施傑仁 |
spellingShingle |
Jie-Ren Shih 施傑仁 An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
author_sort |
Jie-Ren Shih |
title |
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
title_short |
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
title_full |
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
title_fullStr |
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
title_full_unstemmed |
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography |
title_sort |
e cient asic implementation of lattice-based and multivariate post-quantum cryptography |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/07908260015637663085 |
work_keys_str_mv |
AT jierenshih anecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography AT shījiérén anecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography AT jierenshih géxiàngliàngjíduōbiànliànghòuliàngzimìmǎxìtǒngshízuò AT shījiérén géxiàngliàngjíduōbiànliànghòuliàngzimìmǎxìtǒngshízuò AT jierenshih ecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography AT shījiérén ecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography |
_version_ |
1718069449813131264 |