An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography

碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === In this paper, we present an ASIC implementation of two post-quantum publickey cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC...

Full description

Bibliographic Details
Main Authors: Jie-Ren Shih, 施傑仁
Other Authors: 鄭振牟
Format: Others
Language:en_US
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/07908260015637663085
id ndltd-TW-100NTU05442080
record_format oai_dc
spelling ndltd-TW-100NTU054420802015-10-13T21:50:19Z http://ndltd.ncl.edu.tw/handle/07908260015637663085 An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography 格向量及多變量後量子密碼系統實作 Jie-Ren Shih 施傑仁 碩士 國立臺灣大學 電機工程學研究所 100 In this paper, we present an ASIC implementation of two post-quantum publickey cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too "expensive" for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-e cient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more e cient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications. 鄭振牟 2012 學位論文 ; thesis 37 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立臺灣大學 === 電機工程學研究所 === 100 === In this paper, we present an ASIC implementation of two post-quantum publickey cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too "expensive" for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-e cient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more e cient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications.
author2 鄭振牟
author_facet 鄭振牟
Jie-Ren Shih
施傑仁
author Jie-Ren Shih
施傑仁
spellingShingle Jie-Ren Shih
施傑仁
An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
author_sort Jie-Ren Shih
title An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
title_short An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
title_full An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
title_fullStr An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
title_full_unstemmed An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography
title_sort e cient asic implementation of lattice-based and multivariate post-quantum cryptography
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/07908260015637663085
work_keys_str_mv AT jierenshih anecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography
AT shījiérén anecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography
AT jierenshih géxiàngliàngjíduōbiànliànghòuliàngzimìmǎxìtǒngshízuò
AT shījiérén géxiàngliàngjíduōbiànliànghòuliàngzimìmǎxìtǒngshízuò
AT jierenshih ecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography
AT shījiérén ecientasicimplementationoflatticebasedandmultivariatepostquantumcryptography
_version_ 1718069449813131264