Abstract
In 2022, a Korean domestic Post Quantum Cryptography contest called KpqC held, and the standard for Post Quantum Cryptography is set to be selected in 2024. In Round 1 of this competition, 16 algorithms have advanced and are competing. Algorithms submitted to KpqC introduce their performance, but direct performance comparison is difficult because all algorithms were measured in different environments. In this paper, we present the benchmark results of all KpqC algorithms in a single environment. To benchmark the algorithms, we removed the external library dependency of each algorithm. By removing dependencies, performance deviations due to external libraries can be eliminated, and source codes that can conveniently operate the KpqC algorithm can be provided to users who have difficulty setting up the environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feynman, R.P.: Simulating physics with computers. In: Feynman and Computation, pp. 133–153. CRC Press (2018)
Deutsch, D.: Quantum theory, the Church–Turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A Math. Phys. Sci. 400(1818), 97–117 (1985)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Jang, K.-B., Seo, H.-J.: Quantum computer and standardization trend of NIST post-quantum cryptography. In: Proceedings of the Korea Information Processing Society Conference, pp. 129–132. Korea Information Processing Society (2019)
NIST, Round 4 submissions - post-quantum cryptography: CSRC (2022)
Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1–43 (2019)
Lyubashevsky, V., et al.: Crystals-dilithium. In: Algorithm Specifications and Supporting Documentation (2020)
Prest, T., et al.: Falcon. In: Post-Quantum Cryptography Project of NIST (2020)
Bernstein, D.J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J., Schwabe, P.: The SPHINCS\(^+\) signature framework. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 2129–2146 (2019)
Aragon, N., et al.: BIKE: bit flipping key encapsulation (2017)
Albrecht, M.R., et al.: Classic McEliece. Technical report, National Institute of Standards and Technology (2020)
Melchor, C.A., et al.: HQC: hamming quasi-cyclic. In: NIST Post-Quantum Standardization, 3rd Round (2021)
Azarderakhsh, R., et al.: Supersingular isogeny key encapsulation. Submission to the NIST Post-Quantum Standardization Project, vol. 152, pp. 154–155 (2017)
Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. Cryptology ePrint Archive, Paper 2022/975 (2022). https://eprint.iacr.org/2022/975
K. team: KpqC competition round 1 (2023). https://kpqc.or.kr/competition.html. Accessed 07 Apr 2023
Ryu, J., Kim, Y., Yoon, S., Kang, J.-S., Yeom, Y.: IPCC-improved perfect code cryptosystems (2022)
Cho, J., No, J.-S., Lee, Y., Koo, Z., Kim, Y.-S.: Enhanced pqsigRM: code-based digital signature scheme with short signature and fast verification for post-quantum cryptography. Cryptology ePrint Archive (2022)
Kim, C., Kim, Y.-S., No, J.-S.: Layered ROLLO-I: faster rank-metric code-based KEM using ideal LRPC codes. Cryptology ePrint Archive (2022)
Kim, D.-C., Jeon, C.-Y., Kim, Y., Kim, M.: PALOMA: binary separable Goppa-based KEM. In: Esser, A., Santini, P. (eds.) CBCrypto 2023. LNCS, vol. 14311, pp. 144–173. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-46495-9_8
Kim, J.-L., et al.: REDOG and its performance analysis. Cryptology ePrint Archive (2022)
Woo, J., Lee, K., Park, J.H.: GCKSign: simple and efficient signatures from generalized compact knapsacks. Cryptology ePrint Archive (2022)
Kim, J., Park, J.H.: NTRU+: compact construction of NTRU using simple encoding method. Cryptology ePrint Archive (2022)
Cheon, J.H., et al.: HAETAE: hyperball bimodal module rejection signature scheme (2023)
Cheon, J.H., et al.: SMAUG: the key exchange algorithm based on module-LWE and module-LWR (2023)
Shim, K.-A., Kim, J., An, Y.: NCC-Sign: a new lattice-based signature scheme using non-cyclotomic polynomials (2023)
Park, S., Jung, C.-G., Park, A., Choi, J., Kang, H.: TiGER: tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE (R). Cryptology ePrint Archive (2022)
Seo, E.-Y., Kim, Y.-S., Lee, J.-W., No, J.-S.: Peregrine: toward fastest FALCON based on GPV framework. Cryptology ePrint Archive (2022)
Kim, K., et al.: SOLMAE algorithm specifications (2022)
Shim, K.-A., Kim, J., An, Y.: MQ-Sign: a new post-quantum signature scheme based on multivariate quadratic equations: shorter and faster (2022)
Kim, S., Lee, Y., Yoon, K.: FIBS: fast isogeny based digital signature (2022)
Kim, S., et al.: The AIMer signature scheme (2023)
Kannwischer, M.J., Schwabe, P., Stebila, D., Wiggers, T.: Improving software quality in cryptography standardization projects. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 19–30. IEEE (2022)
Kannwischer, M.J., Rijneveld, J., Schwabe, P., Stoffelen, K.: pqm4: testing and benchmarking NIST PQC on ARM Cortex-M4 (2019)
Viega, J., Messier, M., Chandra, P.: Network Security with openSSL: Cryptography for Secure Communications. O’Reilly Media, Inc. (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kwon, H., Sim, M., Song, G., Lee, M., Seo, H. (2024). Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach. In: Kim, H., Youn, J. (eds) Information Security Applications. WISA 2023. Lecture Notes in Computer Science, vol 14402. Springer, Singapore. https://doi.org/10.1007/978-981-99-8024-6_26
Download citation
DOI: https://doi.org/10.1007/978-981-99-8024-6_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-8023-9
Online ISBN: 978-981-99-8024-6
eBook Packages: Computer ScienceComputer Science (R0)