Loading...
Lightweight and DPA-resistant post-quantum cryptoprocessor based on binary ring-LWE
Ebrahimi, S ; Sharif University of Technology | 2020
456
Viewed
- Type of Document: Article
- DOI: 10.1109/CADS50570.2020.9211858
- Publisher: Institute of Electrical and Electronics Engineers Inc , 2020
- Abstract:
- With the exponential growth in the internet of things (IoT) applications such as smart city and e-health, more embedded devices and smart nodes are connected to the network. In order to provide security for such resource-constrained devices, different cryptographic schemes such as public key encryption (PKE) are required. However, considering the high complexity and vulnerability of classic PKE schemes against quantum attacks, it is necessary to consider other possible options. Recently, lattice-based cryptography and especially learning with errors (LWE) have gained high attention due to resistance against quantum attacks and relatively low-complexity operations. During the past decade, some of the variants of Ring-LWE cryptosystem have been implemented efficiently on both hardware and software and are shown to be practical on different resource-constrained and embedded devices in IoT. Besides efficiency, every practical implementation of any cryptosystem must also be analyzed against side-channel attacks. In this paper, we propose masking countermeasure against differential power analysis (DPA) attack on lightweight implementations of binary Ring-LWE on hardware. Our experimental results indicate that proposed DPA-secure implementations have lower than 14% performance overhead and are still practical on resource-constrained devices. Moreover, the FPGA implementation results indicate more than 99% and 81% improvement for speed and efficiency, respectively compared to previous work. © 2020 IEEE
- Keywords:
- Hardware implementation ; Internet of things (IoT) ; Post-quantum cryptography ; Ring learning with errors (Ring-LWE) ; Complex networks ; Computer hardware ; Efficiency ; Hardware security ; Internet of things ; Network architecture ; Public key cryptography ; Cryptographic schemes ; Differential power Analysis ; Internet of thing (IOT) ; Lattice-based cryptography ; Masking countermeasure ; Public-key encryption ; Resourceconstrained devices ; Secure implementation ; Side channel attack
- Source: 20th International Symposium on Computer Architecture and Digital Systems, CADS 2020, 19 August 2020 through 20 August 2020 ; 2020
- URL: https://ieeexplore.ieee.org/document/9211858