You are looking at a specific version 20211029:183128 of this paper. See the latest version.

Paper 2021/1452

A Lightweight Implementation of Saber Resistant Against Side-Channel Attacks

Abubakr Abdulgadir and Kamyar Mohajerani and Viet Ba Dang and Jens-Peter Kaps and Kris Gaj

Abstract

The field of post-quantum cryptography aims to develop and analyze algorithms that can withstand classical and quantum cryptanalysis. The NIST PQC standardization process, now in its third round, specifies ease of protection against side-channel analysis as an important selection criterion. In this work, we develop and validate a masked hardware implementation of Saber key encapsulation mechanism, a third-round NIST PQC finalist. We first design a baseline lightweight hardware architecture of Saber and then apply side-channel countermeasures. Our protected hardware implementation is significantly faster than previously reported protected software and software/hardware co-design implementations. Additionally, applying side-channel countermeasures to our baseline design incurs approximately 2.9x and 1.4x penalty in terms of the number of LUTs and latency, respectively, in modern FPGAs.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. Minor revision. To appear in the proceedings of Indocrypt 2021
Keywords
public-key cryptographyPost-Quantum CryptographyKey Encapsulation Mechanismhardware implementationsSide-Channel AnalysisFPGA
Contact author(s)
aabdulga @ gmu edu,mmohajer @ gmu edu,vdang6 @ gmu edu,jkaps @ gmu edu,kgaj @ gmu edu
History
2021-10-29: received
Short URL
https://ia.cr/2021/1452
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.