On the Performance and Security of Multiplication in GF(2N)

Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algo...

Full description

Bibliographic Details
Main Authors: Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub
Format: Article
Language:English
Published: MDPI AG 2018-09-01
Series:Cryptography
Subjects:
Online Access:http://www.mdpi.com/2410-387X/2/3/25
_version_ 1798042157526810624
author Jean-Luc Danger
Youssef El Housni
Adrien Facon
Cheikh T. Gueye
Sylvain Guilley
Sylvie Herbel
Ousmane Ndiaye
Edoardo Persichetti
Alexander Schaub
author_facet Jean-Luc Danger
Youssef El Housni
Adrien Facon
Cheikh T. Gueye
Sylvain Guilley
Sylvie Herbel
Ousmane Ndiaye
Edoardo Persichetti
Alexander Schaub
author_sort Jean-Luc Danger
collection DOAJ
description Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algorithm and one of the submissions to the National Institute of Standards and Technology’s (NIST) Post-Quantum Cryptography (PQC) standardization call.
first_indexed 2024-04-11T22:31:36Z
format Article
id doaj.art-f0e6d347750c4e619f3fed11a1c882d8
institution Directory Open Access Journal
issn 2410-387X
language English
last_indexed 2024-04-11T22:31:36Z
publishDate 2018-09-01
publisher MDPI AG
record_format Article
series Cryptography
spelling doaj.art-f0e6d347750c4e619f3fed11a1c882d82022-12-22T03:59:22ZengMDPI AGCryptography2410-387X2018-09-01232510.3390/cryptography2030025cryptography2030025On the Performance and Security of Multiplication in GF(2N)Jean-Luc Danger0Youssef El Housni1Adrien Facon2Cheikh T. Gueye3Sylvain Guilley4Sylvie Herbel5Ousmane Ndiaye6Edoardo Persichetti7Alexander Schaub8LTCI, Télécom ParisTech, Université Paris-Saclay, 75013 Paris, FranceSecure-IC S.A.S., 35510 Cesson-Sévigné, FranceSecure-IC S.A.S., 35510 Cesson-Sévigné, FranceDépartement Mathématique et Informatique, Université Cheikh Anta Diop, Dakar 5005, SenegalLTCI, Télécom ParisTech, Université Paris-Saclay, 75013 Paris, FranceSecure-IC S.A.S., 35510 Cesson-Sévigné, FranceDépartement Mathématique et Informatique, Université Cheikh Anta Diop, Dakar 5005, SenegalDepartment of Mathematical Sciences, Florida Atlantic University, Boca Raton, FL 33431, USALTCI, Télécom ParisTech, Université Paris-Saclay, 75013 Paris, FranceMultiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS, a code-based post-quantum cryptographic algorithm and one of the submissions to the National Institute of Standards and Technology’s (NIST) Post-Quantum Cryptography (PQC) standardization call.http://www.mdpi.com/2410-387X/2/3/25finite field arithmetictower fieldspost-quantum cryptographycode-based cryptographycache-timing attackssecure implementation
spellingShingle Jean-Luc Danger
Youssef El Housni
Adrien Facon
Cheikh T. Gueye
Sylvain Guilley
Sylvie Herbel
Ousmane Ndiaye
Edoardo Persichetti
Alexander Schaub
On the Performance and Security of Multiplication in GF(2N)
Cryptography
finite field arithmetic
tower fields
post-quantum cryptography
code-based cryptography
cache-timing attacks
secure implementation
title On the Performance and Security of Multiplication in GF(2N)
title_full On the Performance and Security of Multiplication in GF(2N)
title_fullStr On the Performance and Security of Multiplication in GF(2N)
title_full_unstemmed On the Performance and Security of Multiplication in GF(2N)
title_short On the Performance and Security of Multiplication in GF(2N)
title_sort on the performance and security of multiplication in gf 2n
topic finite field arithmetic
tower fields
post-quantum cryptography
code-based cryptography
cache-timing attacks
secure implementation
url http://www.mdpi.com/2410-387X/2/3/25
work_keys_str_mv AT jeanlucdanger ontheperformanceandsecurityofmultiplicationingf2n
AT youssefelhousni ontheperformanceandsecurityofmultiplicationingf2n
AT adrienfacon ontheperformanceandsecurityofmultiplicationingf2n
AT cheikhtgueye ontheperformanceandsecurityofmultiplicationingf2n
AT sylvainguilley ontheperformanceandsecurityofmultiplicationingf2n
AT sylvieherbel ontheperformanceandsecurityofmultiplicationingf2n
AT ousmanendiaye ontheperformanceandsecurityofmultiplicationingf2n
AT edoardopersichetti ontheperformanceandsecurityofmultiplicationingf2n
AT alexanderschaub ontheperformanceandsecurityofmultiplicationingf2n