Full hardware implementation of the Post-Quantum Public-Key Cryptography Scheme Round5

Author(s):  
Michal Andrzejczak ◽  
Farnoud Farahmand ◽  
Kris Gaj
2019 ◽  
Vol 3 (4) ◽  
pp. 382-396 ◽  
Author(s):  
Ioannis Karageorgos ◽  
Mehmet M. Isgenc ◽  
Samuel Pagliarini ◽  
Larry Pileggi

AbstractIn today’s globalized integrated circuit (IC) ecosystem, untrusted foundries are often procured to build critical systems since they offer state-of-the-art silicon with the best performance available. On the other hand, ICs that originate from trusted fabrication cannot match the same performance level since trusted fabrication is often available on legacy nodes. Split-Chip is a dual-IC approach that leverages the performance of an untrusted IC and combines it with the guaranties of a trusted IC. In this paper, we provide a framework for chip-to-chip authentication that can further improve a Split-Chip system by protecting it from attacks that are unique to Split-Chip. A hardware implementation that utilizes an SRAM-based PUF as an identifier and public key cryptography for handshake is discussed. Circuit characteristics are provided, where the trusted IC is designed in a 28-nm CMOS technology and the untrusted IC is designed in an also commercial 16-nm CMOS technology. Most importantly, our solution does not require a processor for performing any of the handshake or cryptography tasks, thus being not susceptible to software vulnerabilities and exploits.


Author(s):  
Jie-Ren Shih ◽  
Yongbo Hu ◽  
Ming-Chun Hsiao ◽  
Ming-Shing Chen ◽  
Wen-Chung Shen ◽  
...  

2017 ◽  
Author(s):  
Antonio Guimarães ◽  
Diego F. Aranha ◽  
Edson Borin

QcBits is a state-of-the-art constant-time implementation of a code-based encryption scheme for post-quantum public key cryptography. This paper presents an optimized version of its decoding process, which is used for message decryption. Our implementation leverages SSE and AVX instructions extensions and performs 3.6 to 4.8 times faster than the original version, while preserving the 80-bit security level and constant time execution. We also provide experimental data that indicates a further 1.4-factor speedup supposing the existence of instructions for vectorial conditional moves and 256-bit register shifts. Finally, we implemented countermeasures for side-channel security and showed that they do not affect the overall performance.


2010 ◽  
Vol 10 (7&8) ◽  
pp. 541-561
Author(s):  
L.M. Ioannou ◽  
M. Mosca

Let $\ketz$ and $\keto$ be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis $\{\ketz,\keto\}^{\otimes n}$ of $n$ logical qubits, given only a few copies of the unknown states $\ketz$ and $\keto$. A phase-invariant operator is one that is unchanged under the relative phase-shift $\keto \mapsto e^{i \theta}\keto$, for any $\theta$, of all of the $n$ qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most $n$ copies each of $\ket{\0}$ and $\ket{\1}$; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define ``quantum computation in a hidden basis'' to mean executing a quantum algorithm with respect to the phase-shifted hidden basis $\{\ketz, e^{i\theta}\keto\}$, for some potentially unknown $\theta$; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding $\theta$. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).


Sign in / Sign up

Export Citation Format

Share Document