首页> 外文会议>International Conference on Cryptology and Information Security in Latin America >Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs
【24h】

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs

机译:在低成本FPGA上实施新兴 - 简单的密钥交换

获取原文

摘要

Lattice-based cryptography is one of the most promising candidates being considered to replace current public-key systems in the era of quantum computing. In 2016 Alkim, Ducas, Poppelmann, and Schwabe proposed the lattice-based key exchange scheme NewHope. The scheme has gained some popularity in the research community as it is believed to withstand attacks by quantum computers with a comfortable security margin and provides decent efficiency and low communication cost. In this work, we evaluate the efficiency of NewHope on reconfigurable hardware. We provide the up to our knowledge first fieldprogrammable gate array (FPGA) implementation of NewHope-Simple that is a slight modification of NewHope proposed by the authors themselves in 2016. NewHope-Simple is basically NewHope with different error correction mechanism. Our implementation of the client-side scheme requires 1,483 slices, 4,498 look-up tables (LUTs), and 4,635 flip-flops (FFs) on low-cost Xilinx Artix-7 FPGAs. The implementation of the server-side scheme takes 1,708 slices, 5,142 LUTs, and 4,452 FFs. Both cores use only two digital signal processors (DSPs) and four 18 Kb block memories (BRAMs). The implementation has a constant execution time to prevent timing attacks. The server-side operations take 1.4 ms and the client-side operations take 1.5 ms.
机译:基于格子的密码学是最有希望的候选人之一,被认为是在量子计算时代取代当前的公钥系统。 2016年Allim,Ducas,Poppelmann和Schwabe提出了基于格子的关键交换计划Newhope。该方案在研究界中获得了一些人气,因为它被认为抵抗量子计算机的攻击,具有舒适的安全保证金,提供了不良效率和低通信成本。在这项工作中,我们评估了新兴硬件上的纽波普普的效率。我们提供了我们的知识首次现场可编程门阵列(FPGA)的实现Newhope-Simple,这是2016年作者本身提出的新兴的略微修改。Newhope-Simple基本上是具有不同纠错机制的新驼峰。我们的客户端方案的实施需要1,483个切片,4,498个查找表(LUTS)和4,635个触发器(FFS)在低成本Xilinx Artix-7 FPGA上。服务器端方案的实现需要1,708片,5,142 LUT和4,452个FF。两个内核仅使用两个数字信号处理器(DSP)和四个18 kB块存储器(BRAM)。实现具有恒定的执行时间来防止定时攻击。服务器端操作需要1.4 ms,客户端操作需要1.5毫秒。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号