Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card

Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-stu...

Full description

Bibliographic Details
Main Author: Eriksson, Hampus
Format: Others
Language:English
Published: Linköpings universitet, Informationskodning 2020
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-169039
id ndltd-UPSALLA1-oai-DiVA.org-liu-169039
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-liu-1690392020-09-17T05:26:06ZImplementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart CardengImplementering och utvärdering av den kvantresistenta kryptoalgoritmen Kyber på ett smartkortEriksson, HampusLinköpings universitet, Informationskodning2020post-quantumcryptographylattice-based cryptographyquantum-resistantKyberconstrained deviceperformanceevaluationimplementationCommunication SystemsKommunikationssystemCyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. Still, a new class of computation power is on the rise, namely quantum computation. Companies such as Google and IBM have in recent time invested in research regarding quantum computers. In 2019, Google announced that they had achieved quantum supremacy. A quantum computer could in theory break the currently most popular schemes that are used to secure communication. Whether quantum computers will be available in the forseeable future, or at all, is still uncertain. Nonetheless, the implication of a practical quantum computer calls for a new class of crypto schemes; schemes that will remain secure in a post-quantum era. Since 2016 researchers within the field of cryptography have been developing post-quantum cryptographic schemes. One specific branch within this area is lattice-based cryptography. Lattice-based schemes base their security on underlying hard lattice problems, for which there are no currently known efficient algorithms that can solve them. Neither with quantum, nor classical computers. A promising scheme that builds upon these types of problems is Kyber. The aforementioned scheme, as well as its competitors, work efficiently on most computers. However, they still demand a substantial amount of computation power, which is not always available. Some devices are constructed to operate with low power, and are computationally limited to begin with. This group of constrained devices, includes smart cards and microcontrollers, which also need to adopt the post-quantum crypto schemes. Consequently, there is a need to explore how well Kyber and its relatives work on these low power devices. In this thesis, a variant of the cryptographic scheme Kyber is implemented and evaluated on an Infineon smart card. The implementation replaces the scheme’s polynomial multiplication technique, NTT, with Kronecker substitution. In the process, the cryptographic co-processor on the card is leveraged to perform Kronecker substitution efficiently. Moreover, the scheme’s original functionality for sampling randomness is replaced with the card’s internal TRNG. The results show that an IND-CPA secure variant of Kyber can be implemented on the smart card, at the cost of segmenting the IND-CPA functions. All in all, key generation, encryption, and decryption take 23.7 s, 30.9 s and 8.6 s to execute respectively. This shows that the thesis work is slower than implementations of post-quantum crypto schemes on similarly constrained devices. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-169039application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic post-quantum
cryptography
lattice-based cryptography
quantum-resistant
Kyber
constrained device
performance
evaluation
implementation
Communication Systems
Kommunikationssystem
spellingShingle post-quantum
cryptography
lattice-based cryptography
quantum-resistant
Kyber
constrained device
performance
evaluation
implementation
Communication Systems
Kommunikationssystem
Eriksson, Hampus
Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
description Cyber attacks happen on a daily basis, where criminals can aim to disrupt internet services or in other cases try to get hold of sensitive data. Fortunately, there are systems in place to protect these services. And one can rest assured that communication channels and data are secured under well-studied cryptographic schemes. Still, a new class of computation power is on the rise, namely quantum computation. Companies such as Google and IBM have in recent time invested in research regarding quantum computers. In 2019, Google announced that they had achieved quantum supremacy. A quantum computer could in theory break the currently most popular schemes that are used to secure communication. Whether quantum computers will be available in the forseeable future, or at all, is still uncertain. Nonetheless, the implication of a practical quantum computer calls for a new class of crypto schemes; schemes that will remain secure in a post-quantum era. Since 2016 researchers within the field of cryptography have been developing post-quantum cryptographic schemes. One specific branch within this area is lattice-based cryptography. Lattice-based schemes base their security on underlying hard lattice problems, for which there are no currently known efficient algorithms that can solve them. Neither with quantum, nor classical computers. A promising scheme that builds upon these types of problems is Kyber. The aforementioned scheme, as well as its competitors, work efficiently on most computers. However, they still demand a substantial amount of computation power, which is not always available. Some devices are constructed to operate with low power, and are computationally limited to begin with. This group of constrained devices, includes smart cards and microcontrollers, which also need to adopt the post-quantum crypto schemes. Consequently, there is a need to explore how well Kyber and its relatives work on these low power devices. In this thesis, a variant of the cryptographic scheme Kyber is implemented and evaluated on an Infineon smart card. The implementation replaces the scheme’s polynomial multiplication technique, NTT, with Kronecker substitution. In the process, the cryptographic co-processor on the card is leveraged to perform Kronecker substitution efficiently. Moreover, the scheme’s original functionality for sampling randomness is replaced with the card’s internal TRNG. The results show that an IND-CPA secure variant of Kyber can be implemented on the smart card, at the cost of segmenting the IND-CPA functions. All in all, key generation, encryption, and decryption take 23.7 s, 30.9 s and 8.6 s to execute respectively. This shows that the thesis work is slower than implementations of post-quantum crypto schemes on similarly constrained devices.
author Eriksson, Hampus
author_facet Eriksson, Hampus
author_sort Eriksson, Hampus
title Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
title_short Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
title_full Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
title_fullStr Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
title_full_unstemmed Implementing and Evaluating the Quantum Resistant Cryptographic Scheme Kyber on a Smart Card
title_sort implementing and evaluating the quantum resistant cryptographic scheme kyber on a smart card
publisher Linköpings universitet, Informationskodning
publishDate 2020
url http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-169039
work_keys_str_mv AT erikssonhampus implementingandevaluatingthequantumresistantcryptographicschemekyberonasmartcard
AT erikssonhampus implementeringochutvarderingavdenkvantresistentakryptoalgoritmenkyberpaettsmartkort
_version_ 1719340070616432640