Abstract
Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism. Scabbard has three schemes, called Florete, Espada, and Sable. Florete is a Ring-LWR-based KEM that effectively reuses the hardware architecture module used in Saber. Espada is a Module-LWR-based KEM that can be parallelized, requires very little memory, and is advantageous for operating in a resource-constrained environment. Finally, Sable adjusted the parameters to reduce the standard deviation of errors occurring in the Saber. In this paper, we propose ARMing-sword that optimized implementation of Scabbard on ARM processor. For the efficient implementation, a parallel operation technique using vector registers and vector instructions of the ARM processor is used. We focused on optimizing the multiplier, which takes majority execution time for Scabbard computation, and propose a Direct Mapping and Sliding Window methods for accumulating computation results. ARMing-sword has a performance difference of up-to 6.34\(\times \) in the multiplier and a performance difference of up-to 2.17\(\times \) in the encryption algorithm to which the optimization technique is applied.
This work was partly supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00264, Research on Blockchain Security Technology for IoT Services, 50%) and this work was partly supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2020R1F1A1048478, 50%) and this work was partly supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2022-0-00627, Development of Lightweight BIoT technology for Highly Constrained Devices, 25%).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Deutsch, D.: Quantum theory, the church-turing principle and the universal quantum computer. Proc. R. Soc. Lond. A Math. Phys. Sci. 400(1818), 97–117 (1985)
Leuenberger, M.N., Loss, D.: Quantum computing in molecular magnets. Nature 410(6830), 789–793 (2001)
Boualem, A., De Runz, C., Ayaida, M.: Partial paving strategy: application to optimize the area coverage problem in mobile wireless sensor networks. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. 13(2), 1–22 (2022)
Kirsch, Z., Chow, M.: Quantum computing: the risk to existing encryption methods (2015). https://wwwcs.tufts.edu/comp/116/archive/fall2015/zkir sch. pdf
Moody, D., et al.: Status report on the second round of the NIST post-quantum cryptography standardization process (2020)
Bernstein, D.J., et al.: Classic McEliece: conservative code-based cryptography (2017)
Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1–43 (2019)
Chen, C., et al.: NTRU algorithm specifications and supporting documentation. In: Second PQC Standardization Conference (2019)
D’Anvers, J.-P., Karmakar, A., Sinha Roy, S., Vercauteren, F.: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2018. LNCS, vol. 10831, pp. 282–305. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-89339-6_16
Auten, D., Gamage, T.: Impact of resource-constrained networks on the performance of NIST round-3 PQC candidates. In: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 768–773. IEEE (2021)
Mera, J.M.B., Karmakar, A., Kundu, S., Verbauwhede, I.: Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms. IACR Trans. Cryptographic Hardware Embed. Syst. 2021, 474–509 (2021)
Knuth, D.E.: Art of Computer Programming, Volume 2: Seminumerical Algorithms. Addison-Wesley Professional, Boston (2014)
Kwon, H., et al.: ARMed Frodo. In: Kim, H. (ed.) WISA 2021. LNCS, vol. 13009, pp. 206–217. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89432-0_17
Song, J., Kim, Y., Seo, S.: Optimization study of Toom-Cook algorithm in NIST PQC SABER utilizing ARM/NEON processor. J. Korea Inst. Inf. Secur. Cryptol. 31(3), 463–471 (2021)
Kim, Y., Song, J., Seo, S.C.: Accelerating falcon on ARMv8. IEEE Access (2022)
Kwon, H., Kim, H., Sim, M., Lee, W.-K., Seo, H.: Look-up the rainbow: efficient table-based parallel implementation of rainbow signature on 64-bit ARMv8 processors. Cryptology ePrint Archive (2021)
You, G., Kim, G., Cho, S.-J., Han, H.: A comparative study on optimization, obfuscation, and deobfuscation tools in android. J. Internet Serv. Inf. Secur. 11(1), 2–15 (2021)
ARMv8-A instruction set architecture. https://documentation-service.arm.com/static/613a2c38674a052ae36ca307. Accessed 26 June 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 Springer Nature Switzerland AG
About this paper
Cite this paper
Kwon, H. et al. (2023). ARMing-Sword: Scabbard on ARM. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-25659-2_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25658-5
Online ISBN: 978-3-031-25659-2
eBook Packages: Computer ScienceComputer Science (R0)