Loading...

On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards

Boorghany, A ; Sharif University of Technology | 2015

544 Viewed
  1. Type of Document: Article
  2. DOI: 10.1145/2700078
  3. Publisher: Association for Computing Machinery , 2015
  4. Abstract:
  5. Most lattice-based cryptographic schemes with a security proof suffer from large key sizes and heavy computations. This is also true for the simpler case of authentication protocols that are used on smart cards as a very-constrained computing environment. Recent progress on ideal lattices has significantly improved the efficiency and made it possible to implement practical lattice-based cryptography on constrained devices. However, to the best of our knowledge, no previous attempts have been made to implement lattice-based schemes on smart cards. In this article, we provide the results of our implementation of several state-of-the art lattice-based authentication protocols on smart cards and a microcontroller widely used in smart cards. Our results show that only a few of the proposed lattice-based authentication protocols can be implemented using limited resources of such constrained devices; however, cutting-edge ones are suitably efficient to be used practically on smart cards. Moreover, we have implemented fast Fourier transform (FFT) and discrete Gaussian sampling with different typical parameter sets, as well as versatile lattice-based public-key encryptions. These results have noticeable points that help to design or optimize lattice-based schemes for constrained devices
  6. Keywords:
  7. Authentication protocol ; Constrained device ; Lattice-based cryptography ; Postquantum cryptography ; Authentication ; Constrained optimization ; Cryptography ; Fast Fourier transforms ; Public key cryptography ; Smart cards ; Transportation ; Authentication protocols ; Constrained devices ; Constrained implementation ; Lattice-based cryptography ; Post quantum cryptography ; Hardware security
  8. Source: ACM Transactions on Embedded Computing Systems ; Volume 14, Issue 3 , 2015 ; 15399087 (ISSN)
  9. URL: http://dl.acm.org/citation.cfm?doid=2764962.2700078