U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
Presentation

Saber Post-Quantum Key Encapsulation Mechanism (KEM): Evaluating Performance in Mobile Devices and Suggesting Some Improvements / Evaluating Kyber in post-quantum KEM in a mobile application

June 8, 2021

Presenters

Leonardo Augusto D. S. Ribeiro - Universidade Federal de Pernambuco

Description

This is the migration of two papers: 1) Saber Post-Quantum Key Encapsulation Mechanism (KEM): Evaluating Performance in Mobile Devices and Suggesting Some Improvements; 2) Evaluating Kyber in post-quantum KEM in a mobile application

The use of Post Quantum Cryptography algorithms has become a requirement to whomever is concerned with the security of digital information given the likelihood of the existence and wide availability of quantum computers, particularly in mobile devices. Here we present an evaluation of Kyber KEM algorithm running on an Android mobile application. The main objective is analysing if Kyber algorithm is effcient for this scenario.

Saber is one of the four fnalists in the ongoing NIST Post-Quantum Cryptography Standardization Process. It is one of the three fnalists that are based on lattice problems. This article intends to show the results of an analysis of Saber (Vercauteren, 2018) performance in x64 and ARM architectures. Saber was tested following a scenario where frst a pair of public and private keys were generated. Then, a data representing a session key is encrypted using the generated public key and decrypted using the generated private key. Algorithm
performance was evaluated running these steps in each architecture proposed. Based on the data collected, it is checked if Saber is suitable to mobile devices or not. Bottlenecks were found while executing Saber code. Also some improvements were proposed to its code.

Event Details

Location

    
                            

Related Topics

Security and Privacy: post-quantum cryptography

Created June 08, 2021, Updated June 10, 2021