Quantum computers are no longer ideas but concrete devices. They could represent a threat for public key cryptography; therefore, in 2017 NIST initiated a process to evaluate and standardize a number of quantum-resistant cryptographic algorithms. Some of these algorithms handle large size keys that may cause a reduction of performances in specific contexts. In this paper, we investigate the possibility to speed up the key-pair generation phase of McEliece cryptosystem. Taking advantage of improved polynomial multiplication in field of characteristic 2, remodelling matrices and handling cache in a clever way, it is possible to speed up the generation phase of private and public keys, paying a negligible amount of memory.
Optimizing the Key-Pair Generation Phase of McEliece Cryptosystem / M. Ceria, A. De Piccoli, M. Tiziani, A. Visconti (LECTURE NOTES ON DATA ENGINEERING AND COMMUNICATIONS TECHNOLOGIES). - In: 4th International Conference on Wireless, Intelligent and Distributed Environment for Communication / [a cura di] I. Woungang, S.K. Dhurandher. - [s.l] : Springer, 2022. - ISBN 978-3-030-89775-8. - pp. 111-122 (( Intervento presentato al 4. convegno WIDECOM tenutosi a KwaZulu-Natal nel 2021 [10.1007/978-3-030-89776-5_8].
Optimizing the Key-Pair Generation Phase of McEliece Cryptosystem
A. De PiccoliSecondo
;A. ViscontiUltimo
2022
Abstract
Quantum computers are no longer ideas but concrete devices. They could represent a threat for public key cryptography; therefore, in 2017 NIST initiated a process to evaluate and standardize a number of quantum-resistant cryptographic algorithms. Some of these algorithms handle large size keys that may cause a reduction of performances in specific contexts. In this paper, we investigate the possibility to speed up the key-pair generation phase of McEliece cryptosystem. Taking advantage of improved polynomial multiplication in field of characteristic 2, remodelling matrices and handling cache in a clever way, it is possible to speed up the generation phase of private and public keys, paying a negligible amount of memory.File | Dimensione | Formato | |
---|---|---|---|
Widecom2021_accepted.pdf
accesso riservato
Tipologia:
Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione
121.6 kB
Formato
Adobe PDF
|
121.6 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
978-3-030-89776-5_8.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Dimensione
188.71 kB
Formato
Adobe PDF
|
188.71 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.