Skip to main content

ARMed Frodo

FrodoKEM on 64-Bit ARMv8 Processors

  • Conference paper
  • First Online:
Information Security Applications (WISA 2021)

Abstract

FrodoKEM is one of Post-quantum Cryptography, which is selected Round 3 alternate candidates of Public-key Encryption and Key-establishment Algorithms at NIST Post-quantum Cryptography Standardization. FrodoKEM uses AES algorithm for generate pseudo-random matrix, and also uses matrix-multiplication. At that time, a huge computational load occurred to the pseudo-random number generation and matrix-multiplication operation, reducing the overall performance of the FrodoKEM scheme. In this paper, we propose the parallel matrix-multiplication and built-in AES accelerator for AES encryption on ARMv8 processors, and applied these techniques to the FrodoKEM-640 scheme. To implement the parallel matrix-multiplication, vector registers (i.e. 128-bit wise) and vector instructions (i.e. NEON) are used. The proposed parallel matrix-multiplication can be generated 80 element of output matrix at once. As a result, the matrix-multiplication has 43.8\(\times \) faster than the normal matrix-multiplication in the best-case, the implementation FrodoKEM-640 with all of proposed techniques has 10.22\(\times \) better performance in maximum than previous C only implementation.

This work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No.2018-0-00264, Research on Blockchain Security Technology for IoT Services, 25%) and this work was partly supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2020R1F1A1048478, 25%) and this work was partly supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2021-0-00540, Development of Fast Design and Implementation of Cryptographic Algorithms based on GPU/ASIC, 25%) and this work was partly supported by Institute for Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (<Q|Crypton>, No.2019-0-00033, Study on Quantum Security Evaluation of Cryptography based on Computational Quantum Complexity, 25%).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/PQClean/PQClean.

References

  1. Bos, J., et al.: Frodo: take off the ring! practical, quantum-secure key exchange from LWE. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1006–1018 (2016)

    Google Scholar 

  2. Aragon, N., et al.: BIKE: bit flipping key encapsulation (2017)

    Google Scholar 

  3. Melchor, C.A., et al.: Hamming quasi-cyclic (HQC). NIST PQC Round 2, 4–13 (2018)

    Google Scholar 

  4. Bernstein, D.J., Chuengsatiansup, C., Lange, T., van Vredendaal, C.: NTRU Prime: reducing attack surface at low cost. In: Adams, C., Camenisch, J. (eds.) SAC 2017. LNCS, vol. 10719, pp. 235–260. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-72565-9_12

    Chapter  Google Scholar 

  5. Azarderakhsh, R., et al.: Supersingular isogeny key encapsulation, Submission to the NIST Post-Quantum Standardization project (2017)

    Google Scholar 

  6. Gouvêa, C.P.L., López, J.: Implementing GCM on ARMv8. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 167–180. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16715-2_9

    Chapter  Google Scholar 

  7. Sanal, P., Karagoz, E., Seo, H., Azarderakhsh, R., Mozaffari-Kermani, M.: Kyber on ARM64: Compact implementations of Kyber on 64-bit ARM Cortex-A processors. Cryptology ePrint Archive. https://eprint.iacr.org/2021/561

  8. Nguyen, D.T., Gaj, K.: Optimized software implementations of crystals-kyber, ntru, and saber using neon-based special instructions of armv8 (2021)

    Google Scholar 

  9. Jalali, A., Azarderakhsh, R., Kermani, M.M., Campagna, M., Jao, D.: ARMv8 SIKE: optimized supersingular isogeny key encapsulation on armv8 processors. IEEE Trans. Circuits Syst. I Regul. Pap. 66(11), 4209–4218 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kwon, H. et al. (2021). ARMed Frodo. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https://doi.org/10.1007/978-3-030-89432-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89432-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89431-3

  • Online ISBN: 978-3-030-89432-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics