Paper 2021/561

Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors

Pakize Sanal, Emrah Karagoz, Hwajeong Seo, Reza Azarderakhsh, and Mehran Mozaffari-Kermani

Abstract

Public-key cryptography based on the lattice problem is efficient and believed to be secure in a post-quantum era. In this paper, we introduce carefully optimized implementations of Kyber encryption schemes for 64-bit ARM Cortex-A processors. Our research contribution includes several optimizations for Number Theoretic Transform (NTT), noise sampling, and AES accelerator based symmetric function implementations. The proposed Kyber512 implementation on ARM64 improved previous works by 1.72×, 1.88×, and 2.29× for key generation, encapsulation, and decapsulation, respectively. Moreover, by using AES accelerator in the proposed Kyber512-90s implementation, it is improved by 8.57×, 6.94×, and 8.26× for key generation, encapsulation, and decapsulation, respectively. These results set new speed records for Kyber encryption on 64-bit ARM Cortex-A processors.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Post-quantum CryptographyKyberARM64Vectorized Implementation
Contact author(s)
razarderakhsh @ fau edu
psanal2018 @ fau edu
ekaragoz2017 @ fau edu
History
2021-05-03: received
Short URL
https://ia.cr/2021/561
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/561,
      author = {Pakize Sanal and Emrah Karagoz and Hwajeong Seo and Reza Azarderakhsh and Mehran Mozaffari-Kermani},
      title = {Kyber on {ARM64}: Compact Implementations of Kyber on 64-bit {ARM} Cortex-A Processors},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/561},
      year = {2021},
      url = {https://eprint.iacr.org/2021/561}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.