Code-based cryptography on reconfigurable hardware: tweaking Niederreiter encryption for performance

作者: Stefan Heyse , Tim Güneysu

DOI: 10.1007/S13389-013-0056-4

关键词:

摘要: Today’s public-key schemes that are either based on the factorization or discrete logarithm problem. Since both problems closely related, a major breakthrough in cryptanalysis (e.g., with advent of quantum computing will render nearly all currently employed security system useless. Code-based rely alternative assumption decoding generic linear binary codes is NP-complete. Two code-based for encryption available due to McEliece and Niederreiter. Although most researchers analyzed implemented McEliece’s cryptosystem, we show this work scheme by Niederreiter has some important advantages, such as smaller keys, more practical plain ciphertext sizes less computation complexity. In particular, propose an efficient FPGA implementation Niederreiter’s can encrypt than 1.5 million plaintexts per seconds Xilinx Virtex-6 FPGA—outperforming known implementations other popular cryptosystems so far.

参考文章(62)
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf, Time-Area Optimized Public-Key Engines: $\mathcal{MQ}$-Cryptosystems as Replacement for Elliptic Curves? cryptographic hardware and embedded systems. pp. 45- 61 ,(2008) , 10.1007/978-3-540-85053-3_4
Pierre-Louis Cayrel, Gerhard Hoffmann, Edoardo Persichetti, Efficient implementation of a CCA2-Secure variant of mceliece using generalized srivastava codes public key cryptography. pp. 138- 155 ,(2012) , 10.1007/978-3-642-30057-8_9
Robert Niebuhr, Pierre-Louis Cayrel, Broadcast attacks against code-based schemes WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology. pp. 1- 17 ,(2011) , 10.1007/978-3-642-34159-5_1
Daniel V. Bailey, Daniel Coffin, Adam Elbirt, Joseph H. Silverman, Adam D. Woodbury, NTRU in Constrained Devices cryptographic hardware and embedded systems. pp. 262- 272 ,(2001) , 10.1007/3-540-44709-1_22
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Daniel J. Bernstein, Tanja Lange, Post Quantum Cryptography Nature. ,vol. 549, pp. 188- 194 ,(2008) , 10.1038/NATURE23461
Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, Ayoub Otmani, Reducing Key Length of the McEliece Cryptosystem international conference on cryptology in africa. pp. 77- 97 ,(2009) , 10.1007/978-3-642-02384-2_6
Raphael Overbeck, Nicolas Sendrier, Code-based cryptography Encyclopedia of Cryptography and Security (2nd Ed.). pp. 95- 145 ,(2009) , 10.1007/978-3-540-88702-7_4
Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan, Side Channels in the McEliece PKC PQCrypto '08 Proceedings of the 2nd International Workshop on Post-Quantum Cryptography. pp. 216- 229 ,(2008) , 10.1007/978-3-540-88403-3_15