Conference paper Open Access

A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things

Cheng, H.; Dinu, D.; Großschädl, P.; Rønne, P.; Ryan, P.


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.3952246</identifier>
  <creators>
    <creator>
      <creatorName>Cheng, H.</creatorName>
      <givenName>H.</givenName>
      <familyName>Cheng</familyName>
      <affiliation>University of Luxembourg</affiliation>
    </creator>
    <creator>
      <creatorName>Dinu, D.</creatorName>
      <givenName>D.</givenName>
      <familyName>Dinu</familyName>
      <affiliation>IPAS, Intel</affiliation>
    </creator>
    <creator>
      <creatorName>Großschädl, P.</creatorName>
      <givenName>P.</givenName>
      <familyName>Großschädl</familyName>
      <affiliation>University of Luxembourg</affiliation>
    </creator>
    <creator>
      <creatorName>Rønne, P.</creatorName>
      <givenName>P.</givenName>
      <familyName>Rønne</familyName>
      <affiliation>University of Luxembourg</affiliation>
    </creator>
    <creator>
      <creatorName>Ryan, P.</creatorName>
      <givenName>P.</givenName>
      <familyName>Ryan</familyName>
      <affiliation>University of Luxembourg</affiliation>
    </creator>
  </creators>
  <titles>
    <title>A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2020</publicationYear>
  <subjects>
    <subject>Lightweight cryptography</subject>
    <subject>Post-quantum cryptography</subject>
    <subject>Key encapsulation mechanism</subject>
    <subject>NTRU Prime</subject>
    <subject>Efficient implementation</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2020-07-20</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="Text">Conference paper</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="doi">10.1007/978-3-030-41702-4_7</alternateIdentifier>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/3952246</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.3952245</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/futuretpm-h2020</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of the classical NTRU cryptosystem that comes with a couple of tweaks to minimize the attack surface; most notably, it avoids rings with &amp;ldquo;worrisome&amp;rdquo; structure. This paper presents, to our knowledge, the first assembler-optimized implementation of Streamlined NTRU Prime for an 8-bit AVR microcontroller and shows that high-security latticebased cryptography is feasible for small IoT devices. An encapsulation operation using parameters for 128-bit post-quantum security requires 8.2 million clock cycles when executed on an 8-bit ATmega1284 microcontroller. The decapsulation is approximately twice as costly and has an execution time of 15.6 million cycles. We achieved this performance through (i) new low-level software optimization techniques to accelerate Karatsuba-based polynomial multiplication on the 8-bit AVR platform and (ii) an efficient implementation of the coefficient modular reduction written in assembly language. The execution time of encapsulation and decapsulation is independent of secret data, which makes our software resistant against timing attacks. Finally, we assess the performance one could theoretically gain by using a so-called product-form polynomial as part of the secret key and discuss potential security implications.&lt;/p&gt;</description>
  </descriptions>
  <fundingReferences>
    <fundingReference>
      <funderName>European Commission</funderName>
      <funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
      <awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/779391/">779391</awardNumber>
      <awardTitle>Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module</awardTitle>
    </fundingReference>
  </fundingReferences>
</resource>
128
49
views
downloads
All versions This version
Views 128128
Downloads 4949
Data volume 19.1 MB19.1 MB
Unique views 124124
Unique downloads 4747

Share

Cite as