PQC-HA: A Framework for Prototyping and In-Hardware Evaluation of Post-Quantum Cryptography Hardware Accelerators

ArXiv Pub Date : 2023-08-12 DOI:10.48550/arXiv.2308.06621
Richard Sattel, Christoph Spang, Carsten Heinz, Andreas Koch
{"title":"PQC-HA: A Framework for Prototyping and In-Hardware Evaluation of Post-Quantum Cryptography Hardware Accelerators","authors":"Richard Sattel, Christoph Spang, Carsten Heinz, Andreas Koch","doi":"10.48550/arXiv.2308.06621","DOIUrl":null,"url":null,"abstract":"In the third round of the NIST Post-Quantum Cryptography standardization project, the focus is on optimizing software and hardware implementations of candidate schemes. The winning schemes are CRYSTALS Kyber and CRYSTALS Dilithium, which serve as a Key Encapsulation Mechanism (KEM) and Digital Signature Algorithm (DSA), respectively. This study utilizes the TaPaSCo open-source framework to create hardware building blocks for both schemes using High-level Synthesis (HLS) from minimally modified ANSI C software reference implementations across all security levels. Additionally, a generic TaPaSCo host runtime application is developed in Rust to verify their functionality through the standard NIST interface, utilizing the corresponding Known Answer Test mechanism on actual hardware. Building on this foundation, the communication overhead for TaPaSCo hardware accelerators on PCIe-connected FPGA devices is evaluated and compared with previous work and optimized AVX2 software reference implementations. The results demonstrate the feasibility of verifying and evaluating the performance of Post-Quantum Cryptography accelerators on real hardware using TaPaSCo. Furthermore, the off-chip accelerator communication overhead of the NIST standard interface is measured, which, on its own, outweighs the execution wall clock time of the optimized software reference implementation of Kyber at Security Level 1.","PeriodicalId":93888,"journal":{"name":"ArXiv","volume":"33 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ArXiv","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.48550/arXiv.2308.06621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the third round of the NIST Post-Quantum Cryptography standardization project, the focus is on optimizing software and hardware implementations of candidate schemes. The winning schemes are CRYSTALS Kyber and CRYSTALS Dilithium, which serve as a Key Encapsulation Mechanism (KEM) and Digital Signature Algorithm (DSA), respectively. This study utilizes the TaPaSCo open-source framework to create hardware building blocks for both schemes using High-level Synthesis (HLS) from minimally modified ANSI C software reference implementations across all security levels. Additionally, a generic TaPaSCo host runtime application is developed in Rust to verify their functionality through the standard NIST interface, utilizing the corresponding Known Answer Test mechanism on actual hardware. Building on this foundation, the communication overhead for TaPaSCo hardware accelerators on PCIe-connected FPGA devices is evaluated and compared with previous work and optimized AVX2 software reference implementations. The results demonstrate the feasibility of verifying and evaluating the performance of Post-Quantum Cryptography accelerators on real hardware using TaPaSCo. Furthermore, the off-chip accelerator communication overhead of the NIST standard interface is measured, which, on its own, outweighs the execution wall clock time of the optimized software reference implementation of Kyber at Security Level 1.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
PQC-HA:后量子加密硬件加速器的原型设计和硬件内评估框架
在第三轮NIST后量子密码学标准化项目中,重点是优化候选方案的软件和硬件实现。获胜方案是CRYSTALS Kyber和CRYSTALS diliium,它们分别作为密钥封装机制(Key Encapsulation Mechanism, KEM)和数字签名算法(Digital Signature Algorithm, DSA)。本研究利用TaPaSCo开源框架,在所有安全级别使用最低限度修改的ANSI C软件参考实现为这两种方案使用高级综合(HLS)创建硬件构建块。此外,在Rust中开发了一个通用的TaPaSCo主机运行时应用程序,通过标准的NIST接口验证其功能,在实际硬件上使用相应的已知答案测试机制。在此基础上,评估了TaPaSCo硬件加速器在pcie连接的FPGA器件上的通信开销,并与先前的工作和优化的AVX2软件参考实现进行了比较。结果表明,使用TaPaSCo在实际硬件上验证和评估后量子加密加速器性能的可行性。此外,还测量了NIST标准接口的片外加速器通信开销,其本身超过了安全级别1的Kyber优化软件参考实现的执行时钟时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A computational framework to predict the spreading of Alzheimer's disease. Direct dependencies between neurons explain activity. Quantifying task-relevant representational similarity using decision variable correlation. Conditionally Site-Independent Neural Evolution of Antibody Sequences. Dynamical Mechanisms for Coordinating Long-term Working Memory Based on the Precision of Spike-timing in Cortical Neurons.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1