首页> 外文会议>International Conference on Post-Quantum Cryptography >Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware Codesign
【24h】

Evaluating the Potential for Hardware Acceleration of Four NTRU-Based Key Encapsulation Mechanisms Using Software/Hardware Codesign

机译:使用软件/硬件协同设计评估四种基于NTRU的密钥封装机制的硬件加速潜力

获取原文

摘要

The speed of NTRU-based Key Encapsulation Mechanisms (KEMs) in software, especially on embedded software platforms, is limited by the long execution time of its primary operation, polynomial multiplication. In this paper, we investigate the potential for speeding up the implementations of four NTRU-based KEMs, using software/hardware codesign, when targeting Xilinx Zynq UltraScaleT multiprocessor system-on-chip (MPSoC). All investigated algorithms compete in Round 1 of the NIST PQC standardization process. They include: ntru-kem from the NTRUEncrypt submission, Streamlined NTRU Prime and NTRU LPRime KEMs of the NTRU Prime candidate, and NTRU-HRSS-KEM from the submission of the same name. The most-time consuming operation, polynomial multiplication, is implemented in the Programmable Logic (PL) of Zynq UltraScale+ (i.e., in hardware) using constant-time hardware architectures most appropriate for a given algorithm. The remaining operations are executed in the Processing System (PS) of Zynq, based on the ARM Cortex-A53 Application Processing Unit. The speed-ups of our software/hardware codesigns vs. purely software implementations, running on the same Zynq platform, are determined experimentally, and analyzed in the paper. Our experiments reveal substantial differences among the investigated candidates in terms of their potential to benefit from hardware accelerators, with the special focus on accelerators aimed at offloading to hardware only the most time-consuming operation of a given cryptosystems. The demonstrated speed-ups vs. functionally equivalent purely software implementations vary between 4.0 and 42.7 for encapsulation, and between 6.4 and 149.7 for decapsulation.
机译:软件中(尤其是嵌入式软件平台上)基于NTRU的密钥封装机制(KEM)的速度受到其主要操作多项式乘法执行时间长的限制。在本文中,我们针对Xilinx Zynq UltraScaleT多处理器片上系统(MPSoC),研究了使用软件/硬件代码签名来加速四个基于NTRU的KEM实施的潜力。所有研究过的算法都在NIST PQC标准化过程的第1轮中竞争。它们包括:来自NTRUEncrypt提交的ntru-kem,简化的NTRU Prime候选人的NTRU Prime和NTRU LPRime KEM,以及来自同名提交的NTRU-HRSS-KEM。 Zynq UltraScale +的可编程逻辑(PL)(即在硬件中)使用最适合给定算法的恒定时间硬件体系结构来实现最耗时的多项式运算。其余操作在Zynq的处理系统(PS)中基于ARM Cortex-A53应用处理单元执行。本文通过实验确定并分析了我们在相同Zynq平台上运行的软件/硬件代码集与纯软件实现相比的提速。我们的实验表明,从硬件加速器中受益的潜力方面,被调查的候选者之间存在实质性差异,其中特别关注的加速器旨在将给定密码系统中最耗时的操作仅卸载到硬件上。相对于功能上等效的纯软件实现,已证明的加速与封装之间的差异在4.0和42.7之间,对于解封装之间的差异在6.4和149.7之间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号