Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems

The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the algorithms evaluated by NIST i...

Full description

Bibliographic Details
Main Authors: Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez, Santiago Sánchez-Solano, Piedad Brox
Format: Article
Language:English
Published: MDPI AG 2023-06-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/7/2/29
_version_ 1797595395988127744
author Eros Camacho-Ruiz
Macarena C. Martínez-Rodríguez
Santiago Sánchez-Solano
Piedad Brox
author_facet Eros Camacho-Ruiz
Macarena C. Martínez-Rodríguez
Santiago Sánchez-Solano
Piedad Brox
author_sort Eros Camacho-Ruiz
collection DOAJ
description The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the algorithms evaluated by NIST in the third round of its PQC contest was the NTRU cryptosystem. The main drawback of this algorithm is the enormous amount of time required for the multiplication of polynomials in both the encryption and decryption processes. Therefore, the strategy of speeding up this algorithm using hardware/software co-design techniques where this operation is executed on specific hardware arises. Using these techniques, this work focuses on the acceleration of polynomial multiplication in the encryption process for resource-constrained devices. For this purpose, several hardware multiplications are analyzed following different strategies, taking into account the fact that there are no possible timing information leaks and that the available resources are optimized as much as possible. The designed multiplier is encapsulated as a fully reusable and parametrizable IP module with standard AXI4-Stream interconnection buses, which makes it easy to integrate into embedded systems implemented on programmable devices from different manufacturers. Depending on the resource constraints imposed, accelerations of up to 30–45 times with respect to the software-level multiplication runtime can be achieved using dedicated hardware, with a device occupancy of around 5%.
first_indexed 2024-03-11T02:35:51Z
format Article
id doaj.art-73b26d7924da4249a0e54b74a20d4fad
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-03-11T02:35:51Z
publishDate 2023-06-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-73b26d7924da4249a0e54b74a20d4fad2023-11-18T09:55:40ZengMDPI AGCryptography2410-387X2023-06-01722910.3390/cryptography7020029Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded SystemsEros Camacho-Ruiz0Macarena C. Martínez-Rodríguez1Santiago Sánchez-Solano2Piedad Brox3Instituto de Microelectrónica de Sevilla, IMSE-CNM, CSIC/University of Seville, 41092 Seville, SpainInstituto de Microelectrónica de Sevilla, IMSE-CNM, CSIC/University of Seville, 41092 Seville, SpainInstituto de Microelectrónica de Sevilla, IMSE-CNM, CSIC/University of Seville, 41092 Seville, SpainInstituto de Microelectrónica de Sevilla, IMSE-CNM, CSIC/University of Seville, 41092 Seville, SpainThe advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have emerged. Among the algorithms evaluated by NIST in the third round of its PQC contest was the NTRU cryptosystem. The main drawback of this algorithm is the enormous amount of time required for the multiplication of polynomials in both the encryption and decryption processes. Therefore, the strategy of speeding up this algorithm using hardware/software co-design techniques where this operation is executed on specific hardware arises. Using these techniques, this work focuses on the acceleration of polynomial multiplication in the encryption process for resource-constrained devices. For this purpose, several hardware multiplications are analyzed following different strategies, taking into account the fact that there are no possible timing information leaks and that the available resources are optimized as much as possible. The designed multiplier is encapsulated as a fully reusable and parametrizable IP module with standard AXI4-Stream interconnection buses, which makes it easy to integrate into embedded systems implemented on programmable devices from different manufacturers. Depending on the resource constraints imposed, accelerations of up to 30–45 times with respect to the software-level multiplication runtime can be achieved using dedicated hardware, with a device occupancy of around 5%.https://www.mdpi.com/2410-387X/7/2/29hardware securitypost-quantum cryptographyNTRUembedded systemsresource-constrained devicesIoT
spellingShingle Eros Camacho-Ruiz
Macarena C. Martínez-Rodríguez
Santiago Sánchez-Solano
Piedad Brox
Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
Cryptography
hardware security
post-quantum cryptography
NTRU
embedded systems
resource-constrained devices
IoT
title Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
title_full Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
title_fullStr Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
title_full_unstemmed Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
title_short Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems
title_sort timing attack resistant acceleration of ntru round 3 encryption on resource constrained embedded systems
topic hardware security
post-quantum cryptography
NTRU
embedded systems
resource-constrained devices
IoT
url https://www.mdpi.com/2410-387X/7/2/29
work_keys_str_mv AT eroscamachoruiz timingattackresistantaccelerationofntruround3encryptiononresourceconstrainedembeddedsystems
AT macarenacmartinezrodriguez timingattackresistantaccelerationofntruround3encryptiononresourceconstrainedembeddedsystems
AT santiagosanchezsolano timingattackresistantaccelerationofntruround3encryptiononresourceconstrainedembeddedsystems
AT piedadbrox timingattackresistantaccelerationofntruround3encryptiononresourceconstrainedembeddedsystems