Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3638782.3638800acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccnsConference Proceedingsconference-collections
research-article
Open access

A low-cost configurable hash computing circuit for PQC algorithm

Published: 18 April 2024 Publication History

Abstract

The development of quantum computers has introduced a significant threat to the security of traditional cryptographic algorithms. To address this challenge, post-quantum cryptographic algorithms (PQC) have been developed, offering robust resistance against attacks from quantum computers. The hash operation plays a critical role in many PQC algorithms based on lattice ciphers and represents a substantial resource-consuming component in algorithm implementations. In this paper, we propose a novel circuit structure for hash implementation in FPGA platform. Our design integrates the hash operations of Kyber and Dilithium by reusing a shared Keccak unit and achieves different hash operation modes through parameter configuration in the control unit. Furthermore, we introduce a novel pipeline structure that multiplexes two sets of pipeline registers with an unfolding factor of 1. This innovative approach significantly reduces hardware resource consumption while satisfying the performance requirements of the algorithm. The proposed architecture, implemented on the Kintex-7 FPGA, utilizes 7376 LUTs, 3059 FFs, and 4 DSPs. Compared to the existing state-of-the-art designs, our design reduces about 40.2% of LUT resources, and 14.1% of Flip Flops resources. Additionally, it achieves 391MHZ clock frequency and finishes Keccak operations in 0.123μs. As a result, our design offers a low-cost, configurable hash computing circuit architecture with relatively excellent performance.

References

[1]
R. L. Rivest, A. Shamir, and L. Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM21, 2(Feb. 1978),120-126.
[2]
Victor S. Miller. 1985. Use of Elliptic Curves in Cryptography. In Advances in Cryptology (CRYPTO '85). Springer-Verlag, Berlin, Heidelberg, 417–426.
[3]
Avanzi, R.M., Bos, J.W., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehlé, D. (2017). CRYSTALS-Kyber Algorithm Specifications And Supporting Documentation.
[4]
Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schwabe, P., Seiler, G., and Stehlé, D. (2017). CRYSTALS-Dilithium Algorithm Specifications and Supporting Documentation.
[5]
Dworkin, M. (2015). SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions.
[6]
Wong, M.M., Haj-Yahya, J., Sau, S., and Chattopadhyay, A. (2018). A New High Throughput and Area Efficient SHA-3 Implementation. 2018 IEEE International Symposium on Circuits and Systems (ISCAS), 1-5. L. Beckwith, D. T. Nguyen, and K. Gaj, "High-Performance Hardware Implementation of CRYSTALS-Dilithium," 2021 International Conference on Field-Programmable Technology (ICFPT), Auckland, New Zealand, 2021, pp. 1-10.
[7]
Ricci, S., Malina, L., Jedlicka, P., Smekal, D., Hajny, J., Cíbik, P., and Dobias, P. (2021). Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. Proceedings of the 16th International Conference on Availability, Reliability and Security.
[8]
Zhao, C., Zhang, N., Wang, H., Yang, B., Zhu, W., Li, Z., Zhu, M., Yin, S., Wei, S., and Liu, L. (2021). A Compact and High-Performance Hardware Architecture for CRYSTALS-Dilithium. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022, 270-295.
[9]
Aikata, Mert, A.C., Imran, M., Pagliarini, S.N., and Roy, S.S. (2022). KaLi: A Crystal for Post-Quantum Security. IACR Cryptol. ePrint Arch., 2022, 1086.
[10]
Xing, Y. and Li, S. (2021). A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021, 328-356.
[11]
Langlois, A. and Stehlé, D. (2015). Worst-case to average-case reductions for module lattices. Designs, Codes and Cryptography, 75, 565-599.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCNS '23: Proceedings of the 2023 13th International Conference on Communication and Network Security
December 2023
363 pages
ISBN:9798400707964
DOI:10.1145/3638782
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2024

Check for updates

Author Tags

  1. Dilithium
  2. FPGA
  3. Keccak
  4. Kyber
  5. post-quantum cryptography

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCNS 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 113
    Total Downloads
  • Downloads (Last 12 months)113
  • Downloads (Last 6 weeks)45
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media