Cryptology ePrint Archive: Report 2019/765

SPQCop: Side-channel protected Post-Quantum Cryptoprocessor

Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya

Abstract: The past few decades have seen significant progress in practically realizable quantum technologies. It is well known since the work of Peter Shor that large scale quantum computers will threaten the security of most of the currently used public key cryptographic algorithms. This has spurred the cryptography community to design algorithms which will remain safe even with the emergence of large scale quantum computing systems. An effort in this direction is the currently ongoing post-quantum cryptography (PQC) competition, which has led to the design and analysis of many concrete cryptographic constructions. Among these, Lattice based algorithms have emerged to be promising candidates. Therefore, we focus on the efficient implementation of Ring-LWE based quantum-safe key-exchange algorithms. Further, deployment of hardware implementing such algorithms in critical applications requires security against implementation attacks. In this work, we design a side channel resistant post-quantum cryptoprocessor which supports NewHope-NIST, NewHope-USENIX and HILA5 key-exchange schemes. The implemented cryptoprocessor is highly optimized with minimal overhead due to the countermeasures. It requires about 13,500 LUTs and 8,100 FFs. Due to a significantly pipelined architecture, an operating speed of 406 MHz could be achieved on the latest 16nm FPGAs; resulting in a key-exchange time of only 158uS, 157uS and 148uS for the above mentioned designs respectively. We also present detailed area and performance metrics for different modules required for all the designs. To the best of our knowledge, this work presents the first side-channel leakage resistant post quantum accelerator. Furthermore, this is also the fastest hardware implementation of NewHope-NIST.

Category / Keywords: implementation / cryptography and post-quantum and key-exchange and cryptoprocessor and NewHope and NewHope-Simple and HILA5 and fault-resistance and SCA

Date: received 30 Jun 2019, last revised 30 Jun 2019

Contact author: naina003 at e ntu edu sg,arpanj@iiitd ac in

Available format(s): PDF | BibTeX Citation

Version: 20190702:142505 (All versions of this report)

Short URL: ia.cr/2019/765


[ Cryptology ePrint archive ]