Skip to main content

Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach

  • Conference paper
  • First Online:
Information Security Applications (WISA 2023)

Abstract

In 2022, a Korean domestic Post Quantum Cryptography contest called KpqC held, and the standard for Post Quantum Cryptography is set to be selected in 2024. In Round 1 of this competition, 16 algorithms have advanced and are competing. Algorithms submitted to KpqC introduce their performance, but direct performance comparison is difficult because all algorithms were measured in different environments. In this paper, we present the benchmark results of all KpqC algorithms in a single environment. To benchmark the algorithms, we removed the external library dependency of each algorithm. By removing dependencies, performance deviations due to external libraries can be eliminated, and source codes that can conveniently operate the KpqC algorithm can be provided to users who have difficulty setting up the environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/kpqc-cryptocraft/KPQClean.

References

  1. Feynman, R.P.: Simulating physics with computers. In: Feynman and Computation, pp. 133–153. CRC Press (2018)

    Google Scholar 

  2. Deutsch, D.: Quantum theory, the Church–Turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A Math. Phys. Sci. 400(1818), 97–117 (1985)

    MathSciNet  Google Scholar 

  3. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)

    Google Scholar 

  4. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  MathSciNet  Google Scholar 

  5. Jang, K.-B., Seo, H.-J.: Quantum computer and standardization trend of NIST post-quantum cryptography. In: Proceedings of the Korea Information Processing Society Conference, pp. 129–132. Korea Information Processing Society (2019)

    Google Scholar 

  6. NIST, Round 4 submissions - post-quantum cryptography: CSRC (2022)

    Google Scholar 

  7. Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1–43 (2019)

    Google Scholar 

  8. Lyubashevsky, V., et al.: Crystals-dilithium. In: Algorithm Specifications and Supporting Documentation (2020)

    Google Scholar 

  9. Prest, T., et al.: Falcon. In: Post-Quantum Cryptography Project of NIST (2020)

    Google Scholar 

  10. Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS\(^+\) signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2129–2146 (2019)

    Google Scholar 

  11. Aragon, N., et al.: BIKE: bit flipping key encapsulation (2017)

    Google Scholar 

  12. Albrecht, M.R., et al.: Classic McEliece. Technical report, National Institute of Standards and Technology (2020)

    Google Scholar 

  13. Melchor, C.A., et al.: HQC: hamming quasi-cyclic. In: NIST Post-Quantum Standardization, 3rd Round (2021)

    Google Scholar 

  14. Azarderakhsh, R., et al.: Supersingular isogeny key encapsulation. Submission to the NIST Post-Quantum Standardization Project, vol. 152, pp. 154–155 (2017)

    Google Scholar 

  15. Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. Cryptology ePrint Archive, Paper 2022/975 (2022). https://eprint.iacr.org/2022/975

  16. K. team: KpqC competition round 1 (2023). https://kpqc.or.kr/competition.html. Accessed 07 Apr 2023

  17. Ryu, J., Kim, Y., Yoon, S., Kang, J.-S., Yeom, Y.: IPCC-improved perfect code cryptosystems (2022)

    Google Scholar 

  18. Cho, J., No, J.-S., Lee, Y., Koo, Z., Kim, Y.-S.: Enhanced pqsigRM: code-based digital signature scheme with short signature and fast verification for post-quantum cryptography. Cryptology ePrint Archive (2022)

    Google Scholar 

  19. Kim, C., Kim, Y.-S., No, J.-S.: Layered ROLLO-I: faster rank-metric code-based KEM using ideal LRPC codes. Cryptology ePrint Archive (2022)

    Google Scholar 

  20. Kim, D.-C., Jeon, C.-Y., Kim, Y., Kim, M.: PALOMA: binary separable Goppa-based KEM. In: Esser, A., Santini, P. (eds.) CBCrypto 2023. LNCS, vol. 14311, pp. 144–173. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-46495-9_8

    Chapter  Google Scholar 

  21. Kim, J.-L., et al.: REDOG and its performance analysis. Cryptology ePrint Archive (2022)

    Google Scholar 

  22. Woo, J., Lee, K., Park, J.H.: GCKSign: simple and efficient signatures from generalized compact knapsacks. Cryptology ePrint Archive (2022)

    Google Scholar 

  23. Kim, J., Park, J.H.: NTRU+: compact construction of NTRU using simple encoding method. Cryptology ePrint Archive (2022)

    Google Scholar 

  24. Cheon, J.H., et al.: HAETAE: hyperball bimodal module rejection signature scheme (2023)

    Google Scholar 

  25. Cheon, J.H., et al.: SMAUG: the key exchange algorithm based on module-LWE and module-LWR (2023)

    Google Scholar 

  26. Shim, K.-A., Kim, J., An, Y.: NCC-Sign: a new lattice-based signature scheme using non-cyclotomic polynomials (2023)

    Google Scholar 

  27. Park, S., Jung, C.-G., Park, A., Choi, J., Kang, H.: TiGER: tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE (R). Cryptology ePrint Archive (2022)

    Google Scholar 

  28. Seo, E.-Y., Kim, Y.-S., Lee, J.-W., No, J.-S.: Peregrine: toward fastest FALCON based on GPV framework. Cryptology ePrint Archive (2022)

    Google Scholar 

  29. Kim, K., et al.: SOLMAE algorithm specifications (2022)

    Google Scholar 

  30. Shim, K.-A., Kim, J., An, Y.: MQ-Sign: a new post-quantum signature scheme based on multivariate quadratic equations: shorter and faster (2022)

    Google Scholar 

  31. Kim, S., Lee, Y., Yoon, K.: FIBS: fast isogeny based digital signature (2022)

    Google Scholar 

  32. Kim, S., et al.: The AIMer signature scheme (2023)

    Google Scholar 

  33. Kannwischer, M.J., Schwabe, P., Stebila, D., Wiggers, T.: Improving software quality in cryptography standardization projects. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 19–30. IEEE (2022)

    Google Scholar 

  34. Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: pqm4: testing and benchmarking NIST PQC on ARM Cortex-M4 (2019)

    Google Scholar 

  35. Viega, J., Messier, M., Chandra, P.: Network Security with openSSL: Cryptography for Secure Communications. O’Reilly Media, Inc. (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hwajeong Seo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kwon, H., Sim, M., Song, G., Lee, M., Seo, H. (2024). Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach. In: Kim, H., Youn, J. (eds) Information Security Applications. WISA 2023. Lecture Notes in Computer Science, vol 14402. Springer, Singapore. https://doi.org/10.1007/978-981-99-8024-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8024-6_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8023-9

  • Online ISBN: 978-981-99-8024-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics