U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Presentation

First-Order Masked Kyber on ARM Cortex-M4

June 8, 2021

Presenters

Daniel Heinz - Universität der Bundeswehr

Description

In this work, we present a fast and first-order secure Kyber implementation optimized for ARM Cortex-M4. The ongoing progress of the NIST standardization process for post-quantum cryptography and several presented side-channel attacks have raised an increased demand for side-channel analysis and countermeasures for the proposed finalists. On the foundation of the commonly used PQM4 project, we make use of previous optimizations for Kyber on a Cortex-M4. We further combine different ideas from various recent works on masking Saber and Kyber to achieve a better performance and improve the security in comparison to the original implementations. We show our performance results for first-order secure implementations. Our masked Kyber decapsulation on the ARM Cortex-M4 requires only 4,077,819 cycles which already includes randomness generation from the internal RNG. The masked key generation requires 2,735,925 cycles. We then practically verify our implementation by using the t-test methodology with 100,000 traces.

Event Details

Location

    
                            

Related Topics

Security and Privacy: post-quantum cryptography

Created June 07, 2021, Updated June 10, 2021