Practical CCA2-Secure and Masked Ring-LWE Implementation

During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed. In this work we thus present an instance of ring-L...

Full description

Bibliographic Details
Main Authors: Tobias Oder, Tobias Schneider, Thomas Pöppelmann, Tim Güneysu
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2018-02-01
Series:Transactions on Cryptographic Hardware and Embedded Systems
Subjects:
Online Access:https://tches.iacr.org/index.php/TCHES/article/view/836
id doaj-1ab867b9681343758c2b3881d27248fe
record_format Article
spelling doaj-1ab867b9681343758c2b3881d27248fe2020-11-25T03:47:19ZengRuhr-Universität BochumTransactions on Cryptographic Hardware and Embedded Systems2569-29252018-02-012018110.13154/tches.v2018.i1.142-174Practical CCA2-Secure and Masked Ring-LWE ImplementationTobias Oder0Tobias Schneider1Thomas Pöppelmann2Tim Güneysu3Horst Görtz Institute for IT Security, Ruhr-Universität BochumICTEAM/ELEN/Crypto Group, Université Catholique de LouvainInfineon Technologies AGHorst Görtz Institute for IT Security, Ruhr-Universität Bochum; DFKIDuring the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed. In this work we thus present an instance of ring-LWE encryption that is protected against active attacks (i.e., adaptive chosen-ciphertext attacks) and equipped with countermeasures against side-channel analysis. Our solution is based on a postquantum variant of the Fujisaki-Okamoto (FO) transform combined with provably secure first-order masking. To protect the key and message during decryption, we developed a masked binomial sampler that secures the re-encryption process required by FO. Our work shows that CCA2-secured RLWE-based encryption can be achieved with reasonable performance on constrained devices but also stresses that the required transformation and handling of decryption errors implies a performance overhead that has been overlooked by the community so far. With parameters providing 233 bits of quantum security, our implementation requires 4,176,684 cycles for encryption and 25,640,380 cycles for decryption with masking and hiding countermeasures on a Cortex-M4F. The first-order security of our masked implementation is also practically verified using the non-specific t-test evaluation methodology.https://tches.iacr.org/index.php/TCHES/article/view/836Ideal Latticesring-LWECCA2 securityMaskingHidingSampling
collection DOAJ
language English
format Article
sources DOAJ
author Tobias Oder
Tobias Schneider
Thomas Pöppelmann
Tim Güneysu
spellingShingle Tobias Oder
Tobias Schneider
Thomas Pöppelmann
Tim Güneysu
Practical CCA2-Secure and Masked Ring-LWE Implementation
Transactions on Cryptographic Hardware and Embedded Systems
Ideal Lattices
ring-LWE
CCA2 security
Masking
Hiding
Sampling
author_facet Tobias Oder
Tobias Schneider
Thomas Pöppelmann
Tim Güneysu
author_sort Tobias Oder
title Practical CCA2-Secure and Masked Ring-LWE Implementation
title_short Practical CCA2-Secure and Masked Ring-LWE Implementation
title_full Practical CCA2-Secure and Masked Ring-LWE Implementation
title_fullStr Practical CCA2-Secure and Masked Ring-LWE Implementation
title_full_unstemmed Practical CCA2-Secure and Masked Ring-LWE Implementation
title_sort practical cca2-secure and masked ring-lwe implementation
publisher Ruhr-Universität Bochum
series Transactions on Cryptographic Hardware and Embedded Systems
issn 2569-2925
publishDate 2018-02-01
description During the last years public-key encryption schemes based on the hardness of ring-LWE have gained significant popularity. For real-world security applications assuming strong adversary models, a number of practical issues still need to be addressed. In this work we thus present an instance of ring-LWE encryption that is protected against active attacks (i.e., adaptive chosen-ciphertext attacks) and equipped with countermeasures against side-channel analysis. Our solution is based on a postquantum variant of the Fujisaki-Okamoto (FO) transform combined with provably secure first-order masking. To protect the key and message during decryption, we developed a masked binomial sampler that secures the re-encryption process required by FO. Our work shows that CCA2-secured RLWE-based encryption can be achieved with reasonable performance on constrained devices but also stresses that the required transformation and handling of decryption errors implies a performance overhead that has been overlooked by the community so far. With parameters providing 233 bits of quantum security, our implementation requires 4,176,684 cycles for encryption and 25,640,380 cycles for decryption with masking and hiding countermeasures on a Cortex-M4F. The first-order security of our masked implementation is also practically verified using the non-specific t-test evaluation methodology.
topic Ideal Lattices
ring-LWE
CCA2 security
Masking
Hiding
Sampling
url https://tches.iacr.org/index.php/TCHES/article/view/836
work_keys_str_mv AT tobiasoder practicalcca2secureandmaskedringlweimplementation
AT tobiasschneider practicalcca2secureandmaskedringlweimplementation
AT thomaspoppelmann practicalcca2secureandmaskedringlweimplementation
AT timguneysu practicalcca2secureandmaskedringlweimplementation
_version_ 1724502539355815936