Paper 2021/1189

A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection

Arpan Jati, Naina Gupta, Anupam Chattopadhyay, and Somitra Kumar Sanadhya

Abstract

In this work, we present a configurable and side channel resistant implementation of the post-quantum key-exchange algorithm Crystals-Kyber. The implemented design can be configured for different performance and area requirements leading to different trade-offs for different applications. A low area implementation can be achieved in 5269 LUTs and 2422 FFs, whereas a high performance implementation required 7151 LUTs and 3730 FFs. Due to a deeply pipelined architecture, a high operating speed of more than 250 MHz could be achieved on 28nm Xilinx FPGAs. The side channel resistance is implemented using a carefully chosen set of techniques resulting in a low overhead of less than 5%. To the best of our knowledge, this work presents the first side-channel attack protected configurable accelerator for Crystals-Kyber. Furthermore, one of the configuration choices results in the smallest hardware implementation of Crystals-Kyber known in literature.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
cryptographypost-quantumkey-exchangecryptoprocessorKyberfault-resistanceSCA
Contact author(s)
naina003 @ e ntu edu sg
arpanj @ iiitd ac in
History
2021-09-17: received
Short URL
https://ia.cr/2021/1189
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1189,
      author = {Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya},
      title = {A Configurable Crystals-Kyber Hardware Implementation with Side-Channel Protection},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1189},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1189}},
      url = {https://eprint.iacr.org/2021/1189}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.