Conference paper Open Access

# Post-Quantum Key Encapsulation on 8-bit Microcontrollers: A New Hope for the IoT

Cheng, H.; Groszschaedl, J.; Roenne, P.; Ryan, P.

### Dublin Core Export

<?xml version='1.0' encoding='utf-8'?>
<oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
<dc:creator>Cheng, H.</dc:creator>
<dc:creator>Groszschaedl, J.</dc:creator>
<dc:creator>Roenne, P.</dc:creator>
<dc:creator>Ryan, P.</dc:creator>
<dc:date>2020-08-12</dc:date>
<dc:description>Recent progress in quantum computing has increased interest in the question of how well the existing proposals for post-quantum cryptosystems are suited to replace RSA and ECC. While some aspects of this question have already been researched in detail (e.g. the relative computational cost of pre- and post-quantum algorithms), very little is known about the RAM footprint of the proposals and what execution time they can reach when low memory consumption rather than speed is the main optimization goal. This question is particularly important in the context of the Internet of Things (IoT) since many IoT devices are extremely constrained and possess only a few kB of RAM. We aim to contribute to answering this question by exploring the software design space of the lattice-based key-encapsulation scheme ThreeBears on an 8-bit AVR microcontroller. More concretely, we provide new techniques for the optimization of the ring arithmetic of ThreeBears (which is, in essence, a 3120-bit modular multiplication) to achieve either high speed or low RAM footprint, and we analyze in detail the trade-offs between these two metrics. A low-memory implementation of BabyBear that is secure against Chosen Plaintext Attacks (CPA) needs just about 1.7 kB RAM, which is significantly below the RAM footprint of other latticebased cryptosystems reported in the literature. Yet, the encapsulation time of this RAM-optimized BabyBear version is only around 13 million cycles, which is less than the execution time of a scalar multiplication on Curve25519. The decapsulation is over 3.6 times faster and requires roughly 3.7 million cycles on an ATmega1284 microcontroller.</dc:description>
<dc:identifier>https://zenodo.org/record/3980419</dc:identifier>
<dc:identifier>10.5281/zenodo.3980419</dc:identifier>
<dc:identifier>oai:zenodo.org:3980419</dc:identifier>
<dc:language>eng</dc:language>
<dc:relation>doi:10.5281/zenodo.3980418</dc:relation>
<dc:relation>url:https://zenodo.org/communities/futuretpm-h2020</dc:relation>
<dc:rights>info:eu-repo/semantics/openAccess</dc:rights>
<dc:subject>Post-quantum cryptography</dc:subject>
<dc:subject>Key encapsulation mechanism</dc:subject>
<dc:subject>ThreeBears</dc:subject>
<dc:subject>AVR microcontroller</dc:subject>
<dc:subject>Effcient implementation</dc:subject>
<dc:title>Post-Quantum Key Encapsulation on 8-bit Microcontrollers: A New Hope for the IoT</dc:title>
<dc:type>info:eu-repo/semantics/conferencePaper</dc:type>
<dc:type>publication-conferencepaper</dc:type>
</oai_dc:dc>

39
39
views