Paper 2019/047

NIST Post-Quantum Cryptography- A Hardware Evaluation Study

Kanad Basu, Deepraj Soni, Mohammed Nabeel, and Ramesh Karri

Abstract

Experts forecast that quantum computers can break classical cryptographic algorithms. Scientists are developing post quantum cryptographic (PQC) algorithms, that are invulnerable to quantum computer attacks. The National Institute of Standards and Technology (NIST) started a public evaluation process to standardize quantum-resistant public key algorithms. The objective of our study is to provide a hardware comparison of the NIST PQC competition candidates. For this, we use a High-Level Synthesis (HLS) hardware design methodology to map high-level C specifications of selected PQC candidates into both FPGA and ASIC implementations.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Post-Quantum CryptographyHardware Implementation
Contact author(s)
kb150 @ nyu edu
History
2019-05-16: last of 5 revisions
2019-01-25: received
See all versions
Short URL
https://ia.cr/2019/047
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/047,
      author = {Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri},
      title = {NIST Post-Quantum Cryptography- A Hardware Evaluation Study},
      howpublished = {Cryptology ePrint Archive, Paper 2019/047},
      year = {2019},
      note = {\url{https://eprint.iacr.org/2019/047}},
      url = {https://eprint.iacr.org/2019/047}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.