PQC经典mcelece的SHA-3硬件设计

Xin Zhou, Liji Wu, Xiangmin Zhang
{"title":"PQC经典mcelece的SHA-3硬件设计","authors":"Xin Zhou, Liji Wu, Xiangmin Zhang","doi":"10.1109/asid52932.2021.9651693","DOIUrl":null,"url":null,"abstract":"As the computing power of quantum computers continues to improve, the security of the mathematical problems on current-used cryptographic algorithm are facing more and more serious challenge. It is necessary to formulate the standard of post-quantum cryptographic algorithm. Classic McEliece is one of the 7 candidates entering the Round 3 of NIST PQC contest. In the decryption module of Classic McEliece, H module uses the SHA-3 algorithm. As a new generation of hash algorithm, SHA-3 algorithm uses the Keccak sponge function, which has the advantages of higher speed, higher throughput and stronger security. Keccak truly realizes the processing of input information of any length, and can also generate hash values of any length. In the future, SHA-3 will be applied to more fields, so the high-performance and flexible implementation of the SHA-3 is especially important. This paper analyzed the four SHA-3 algorithms, and integrated the four algorithm standards into one implementation for Classic McEliece. The Xilinx Zynq-7000 series FPGA is chosen as the implementation and verification platform, and the performance are compared with the algorithm implementation of Keccak official team.","PeriodicalId":150884,"journal":{"name":"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Hardware Design of SHA-3 for PQC Classic McEliece\",\"authors\":\"Xin Zhou, Liji Wu, Xiangmin Zhang\",\"doi\":\"10.1109/asid52932.2021.9651693\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the computing power of quantum computers continues to improve, the security of the mathematical problems on current-used cryptographic algorithm are facing more and more serious challenge. It is necessary to formulate the standard of post-quantum cryptographic algorithm. Classic McEliece is one of the 7 candidates entering the Round 3 of NIST PQC contest. In the decryption module of Classic McEliece, H module uses the SHA-3 algorithm. As a new generation of hash algorithm, SHA-3 algorithm uses the Keccak sponge function, which has the advantages of higher speed, higher throughput and stronger security. Keccak truly realizes the processing of input information of any length, and can also generate hash values of any length. In the future, SHA-3 will be applied to more fields, so the high-performance and flexible implementation of the SHA-3 is especially important. This paper analyzed the four SHA-3 algorithms, and integrated the four algorithm standards into one implementation for Classic McEliece. The Xilinx Zynq-7000 series FPGA is chosen as the implementation and verification platform, and the performance are compared with the algorithm implementation of Keccak official team.\",\"PeriodicalId\":150884,\"journal\":{\"name\":\"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/asid52932.2021.9651693\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/asid52932.2021.9651693","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着量子计算机计算能力的不断提高,目前使用的加密算法上数学问题的安全性面临着越来越严峻的挑战。有必要制定后量子密码算法的标准。Classic McEliece是进入NIST PQC比赛第三轮的7名候选人之一。在Classic mcelece的解密模块中,H模块使用了SHA-3算法。SHA-3算法作为新一代哈希算法,采用了Keccak海绵函数,具有速度更快、吞吐量更高、安全性更强的优点。Keccak真正实现了对任意长度的输入信息的处理,也可以生成任意长度的哈希值。在未来,SHA-3将被应用到更多的领域,因此高性能和灵活的SHA-3实现就显得尤为重要。本文对四种SHA-3算法进行了分析,并将四种算法标准集成到经典mcelece的一个实现中。选择Xilinx Zynq-7000系列FPGA作为实现和验证平台,并与Keccak官方团队的算法实现进行性能比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Hardware Design of SHA-3 for PQC Classic McEliece
As the computing power of quantum computers continues to improve, the security of the mathematical problems on current-used cryptographic algorithm are facing more and more serious challenge. It is necessary to formulate the standard of post-quantum cryptographic algorithm. Classic McEliece is one of the 7 candidates entering the Round 3 of NIST PQC contest. In the decryption module of Classic McEliece, H module uses the SHA-3 algorithm. As a new generation of hash algorithm, SHA-3 algorithm uses the Keccak sponge function, which has the advantages of higher speed, higher throughput and stronger security. Keccak truly realizes the processing of input information of any length, and can also generate hash values of any length. In the future, SHA-3 will be applied to more fields, so the high-performance and flexible implementation of the SHA-3 is especially important. This paper analyzed the four SHA-3 algorithms, and integrated the four algorithm standards into one implementation for Classic McEliece. The Xilinx Zynq-7000 series FPGA is chosen as the implementation and verification platform, and the performance are compared with the algorithm implementation of Keccak official team.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approximate Adder Design Based on Inexact Full Adders A Single Event Effect Simulation Method for RISC-V Processor A Precise 3D Positioning Approach Based on UWB with Reduced Base Stations Digital Decimation Filter Design for a 3rd-Order Sigma-Delta Modulator with Achieving 129 dB SNR VLSI Architecture Design for Adder Convolution Neural Network Accelerator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1