Skip to main content

A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection

  • Conference paper
  • First Online:
Topics in Cryptology – CT-RSA 2023 (CT-RSA 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13871))

Included in the following conference series:

Abstract

NIST recently decided upon a set of cryptographic algorithms for future standardization. These algorithms are built upon hard mathematical problems which are believed to be difficult for both classical and quantum computers, unlike RSA and ECC which are trivially broken by a quantum computer running Shor’s algorithm. Cryptographic operations are computationally intense, and therefore are often offloaded to dedicated hardware in order to improve performance and reduce energy usage. However, different applications have different needs for performance, energy, and cost. Thus it is beneficial to have a variety of performance options for hardware acceleration. In this work we present a flexible hardware architecture for selected algorithms, Kyber and Dilithium. Our architecture includes separate instances optimized for either Kyber and Dilithium as well as a combined architecture which support both algorithms in one design. Further, the design can be instantiated at three levels of performance: lightweight, mid-range, and high performance. We also present a masked implementation for the Kyber-only implementation which protects against first order differential power analysis attacks and timing attacks. The masked implementation requires \(2.5\!\times \) more LUTs and \(6.5\!\times \) more clock cycles for decapsulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997). ISSN 0097–5397, 1095–7111. https://doi.org/10.1137/S0097539795293172arXiv:quant-ph/9508027

  2. Castryck, W., Decru, T.: An efficient key recovery attack on SIDH (preliminary version). Cryptology ePrint Archive 2022/975

    Google Scholar 

  3. Beullens, W.: Breaking rainbow takes a weekend on a laptop. Cryptology ePrint Archive 2022/214

    Google Scholar 

  4. Moody, D.: Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process. Technical Report NIST IR 8413, National Institute of Standards and Technology, Gaithersburg, MD (2022). https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8413.pdf

  5. NSA. Cybersecurity Advisory Announcing the Commercial National Security Algorithm Suite 2.0 (2022). https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF

  6. Xing, Y., Li, S.: A compact hardware implementation of CCA-secure key exchange mechanism CRYSTALS-KYBER on FPGA. IACR Trans. Cryptograph. Hardware Embed. Syst. (2021). ISSN 2569–2925. 10.46586/tches.v2021.i2.328-356. https://tches.iacr.org/index.php/TCHES/article/view/8797

  7. Dang, V., Mohajerani, K., Gaj, K.: High-speed hardware architectures and FPGA benchmarking of CRYSTALS-Kyber, NTRU, and Saber. Cryptology ePrint Archive 2021/1508

    Google Scholar 

  8. Land, G., Sasdrich, P., Güneysu, T.: A hard crystal - implementing dilithium on reconfigurable hardware. In: Grosso, V., Pöppelmann, T. (eds.) CARDIS 2021. LNCS, vol. 13173, pp. 210–230. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-97348-3_12 ISBN 978-3-030-97348-3

    Chapter  Google Scholar 

  9. Beckwith, L., Nguyen, D.T., Gaj, K.: High-performance hardware implementation of CRYSTALS-dilithium. In: 2021 International Conference on Field-Programmable Technology (ICFPT) (2021)

    Google Scholar 

  10. Zhao, C., et al.: A Compact and high-performance hardware architecture for CRYSTALS-Dilithium. IACR Trans. Cryptograph. Hardware Embed. Syst. 2022, 270–295 (2022). ISSN 2569–2925. https://doi.org/10.46586/tches.v2022.i1.270-295. https://tches.iacr.org/index.php/TCHES/article/view/9297

  11. Mert, A.C., Jacquemin, D., Das, A., Matthews, D., Ghosh, S., Roy, S.S.: A unified cryptoprocessor for lattice-based signature and key-exchange. Cryptology ePrint Archive 2021/1461

    Google Scholar 

  12. Aikata, A., Mert, A.C., Imran, M., Pagliarini, S., Roy, S.S.: KaLi: a crystal for post-quantum security. Cryptology ePrint Archive 2022/1086

    Google Scholar 

  13. Avanzi, R., et al.: Kyber - Algorithm specifications and supporting documentation. https://pq-crystals.org/kyber/resources.shtml

  14. Bai, S., et al.: CRYSTALS-Dilithium. https://pq-crystals.org/dilithium/resources.shtml

  15. Goos, G., Hartmanis, J., van Leeuwen, J., Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, Michael (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48405-1

  16. Nguyen, D.T., Dang, V.B., Gaj, K.: High-level synthesis in implementing and benchmarking number theoretic transform in lattice-based post-quantum cryptography using software/hardware codesign. In: Rincón, F., Barba, J., So, H.K.H., Diniz, P., Caba, J. (eds.) ARC 2020. LNCS, vol. 12083, pp. 247–257. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44534-8_19

    Chapter  Google Scholar 

  17. Fritzmann, T., et al.: Masked accelerators and instruction set extensions for post-quantum cryptography. IACR Trans. Cryptograph. Hardware Embed. Syst. 2022, 414–460 (2021). ISSN 2569–2925. https://doi.org/10.46586/tches.v2022.i1.414-460. https://tches.iacr.org/index.php/TCHES/article/view/9303

  18. Bos, J.W., Gourjon, M., Renes, J., Schneider, T.: Masking Kyber: First- and Higher-Order Implementations. Cryptology ePrint Archive 2021/483

    Google Scholar 

  19. Heinz, D., Kannwischer, M.J., Land, G., Schwabe, P., Sprenkels, D.: First-Order Masked Kyber on ARM Cortex-M4. Cryptology ePrint Archive 2022/058

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luke Beckwith .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Beckwith, L., Abdulgadir, A., Azarderakhsh, R. (2023). A Flexible Shared Hardware Accelerator for NIST-Recommended Algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA Protection. In: Rosulek, M. (eds) Topics in Cryptology – CT-RSA 2023. CT-RSA 2023. Lecture Notes in Computer Science, vol 13871. Springer, Cham. https://doi.org/10.1007/978-3-031-30872-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-30872-7_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-30871-0

  • Online ISBN: 978-3-031-30872-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics