Software/hardware codesign of the post quantum cryptography algorithm NTRUEncrypt using high-level synthesis and register-transfer level design methodologies
2019 29th international conference on field programmable logic and …, 2019•ieeexplore.ieee.org
When quantum computers become scalable and reliable, they are likely to break all public-
key cryptography standards, such as RSA and Elliptic Curve Cryptography. The projected
threat of quantum computers has led the US National Institute of Standards and Technology
(NIST) to an effort aimed at replacing existing public-key cryptography standards with new
quantum-resistant alternatives. In December 2017, 69 candidates were accepted by NIST to
Round 1 of the NIST Post-Quantum Cryptography (PQC) standardization process …
key cryptography standards, such as RSA and Elliptic Curve Cryptography. The projected
threat of quantum computers has led the US National Institute of Standards and Technology
(NIST) to an effort aimed at replacing existing public-key cryptography standards with new
quantum-resistant alternatives. In December 2017, 69 candidates were accepted by NIST to
Round 1 of the NIST Post-Quantum Cryptography (PQC) standardization process …
When quantum computers become scalable and reliable, they are likely to break all public-key cryptography standards, such as RSA and Elliptic Curve Cryptography. The projected threat of quantum computers has led the U.S. National Institute of Standards and Technology (NIST) to an effort aimed at replacing existing public-key cryptography standards with new quantum-resistant alternatives. In December 2017, 69 candidates were accepted by NIST to Round 1 of the NIST Post-Quantum Cryptography (PQC) standardization process. NTRUEncrypt is one of the most well-known PQC algorithms that has withstood cryptanalysis. The speed of NTRUEncrypt in software, especially on embedded software platforms, is limited by the long execution time of its primary operation, polynomial multiplication. In this paper, we investigate speeding up NTRUEncrypt using software/hardware codesign on a Xilinx Zynq UltraScale+ multiprocessor system-on-chip (MPSoC). Polynomial multiplication is implemented in the Programmable Logic (PL) of Zynq using two approaches: traditional Register-Transfer Level (RTL) and High-Level Synthesis (HLS). The remaining operations of NTRUEncrypt are executed in software on the Processing System (PS) of Zynq, using the bare-metal mode. The speed-up of our software/hardware codesigns vs. purely software implementations is determined experimentally and analyzed in the paper. The results are reported for the RTL-based and HLS-based hardware accelerators, and compared to the best available software implementation, included in the NIST submission package. The speed-ups for encryption were 2.4 and 3.9, depending on the selected parameter set. For decryption, the corresponding speed-ups were 4.0 and 6.8. In addition, for the polynomial multiplication operation itself, the speed up was in excess of 75. Our code for the NTRUEncrypt polynomial multiplier accelerator is being made open-source for further evaluation on multiple software/hardware platforms.
ieeexplore.ieee.org