Reliable Constructions for the Key Generator of Code-based Post-quantum Cryptosystems on FPGA

Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cryptography is one feasible solution whose hardware architectures have become the focus of research in the NIST standardization process and has been advanced to the final round (to be concluded by 2022–2024). Nevertheless, although these constructions, e.g., McEliece and Niederreiter public key cryptography, have strong error correction properties, previous studies have proved the vulnerability of their hardware implementations against faults product of the environment and intentional faults, i.e., differential fault analysis. It is previously shown that depending on the codes used, i.e., classical or reduced (using either quasi-dyadic Goppa codes or quasi-cyclic alternant codes), flaws in error detection could be observed. In this work, efficient fault detection constructions are proposed for the first time to account for such shortcomings. Such schemes are based on regular parity, interleaved parity, and two different cyclic redundancy checks (CRC), i.e., CRC-2 and CRC-8. Without losing the generality, we experiment on the McEliece variant, noting that the presented schemes can be used for other code-based cryptosystems. We perform error detection capability assessments and implementations on field-programmable gate array Kintex-7 device xc7k70tfbv676-1 to verify the practicality of the presented approaches. To demonstrate the appropriateness for constrained embedded systems, the performance degradation and overheads of the presented schemes are assessed.

[1]  Radinka Yorgova,et al.  On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight , 2023, IEEE Access.

[2]  Reza Azarderakhsh,et al.  Hardware Constructions for Lightweight Cryptographic Block Cipher QARMA With Error Detection Mechanisms , 2020, IEEE Transactions on Emerging Topics in Computing.

[3]  Reza Azarderakhsh,et al.  CRC-Based Error Detection Constructions for FLT and ITA Finite Field Inversions Over GF(2m) , 2021, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[4]  Reza Azarderakhsh,et al.  Reliable Architectures for Composite-Field-Oriented Constructions of McEliece Post-Quantum Cryptography on FPGA , 2021, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[5]  Reza Azarderakhsh,et al.  Fault Detection Architectures for Inverted Binary Ring-LWE Construction Benchmarked on FPGA , 2021, IEEE Transactions on Circuits and Systems II: Express Briefs.

[6]  Reza Azarderakhsh,et al.  Reliable CRC-Based Error Detection Constructions for Finite Field Multipliers With Applications in Cryptography , 2021, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[7]  Ming-Shing Chen,et al.  Classic McEliece on the ARM Cortex-M4 , 2021, IACR Cryptol. ePrint Arch..

[8]  Lilian Bossuet,et al.  Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem , 2021, EUROCRYPT.

[9]  Lake Bu,et al.  Quantum-Proof Lightweight McEliece Cryptosystem Co-processor Design , 2020, 2020 IEEE 38th International Conference on Computer Design (ICCD).

[10]  Mariano Lopez-Garcia,et al.  Hardware-Software Implementation of a McEliece Cryptosystem for Post-quantum Cryptography , 2020 .

[11]  R. Azarderakhsh,et al.  Error Detection Architectures for Ring Polynomial Multiplication and Modular Reduction of Ring-LWE in Z /p Z [ x ] x n +1 Benchmarked on ASIC , 2020 .

[12]  E. Karatsiolis,et al.  Classic McEliece Implementation with Low Memory Footprint , 2020, CARDIS.

[13]  Reza Azarderakhsh,et al.  Reliable Architecture-Oblivious Error Detection Schemes for Secure Cryptographic GCM Structures , 2019, IEEE Transactions on Reliability.

[14]  Zhe Li,et al.  Reducing the Key Size of McEliece Cryptosystem from Automorphism-induced Goppa Codes via Permutations , 2019, Public Key Cryptography.

[15]  Reza Azarderakhsh,et al.  Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes , 2018, ACM Trans. Embed. Comput. Syst..

[16]  Reza Azarderakhsh,et al.  Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[17]  Daniel J. Bernstein,et al.  conservative code-based cryptography , 2017 .

[18]  Ravi S. Sandhu,et al.  Fingerprint-Based Detection and Diagnosis of Malicious Programs in Hardware , 2015, IEEE Transactions on Reliability.

[19]  Reza Azarderakhsh,et al.  Reliable and Error Detection Architectures of Pomaranch for False-Alarm-Sensitive Cryptographic Applications , 2015, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[20]  Arash Reyhani-Masoleh,et al.  Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[21]  Reza Azarderakhsh,et al.  Reliable Concurrent Error Detection Architectures for Extended Euclidean-Based Division Over ${\rm GF}(2^{m})$ , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[22]  Falko Strenzke,et al.  Efficiency and implementation security of code-based cryptosystems , 2013 .

[23]  Arash Reyhani-Masoleh,et al.  A High-Performance Fault Diagnosis Approach for the AES SubBytes Utilizing Mixed Bases , 2011, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography.

[24]  Abdulhadi Shoufan,et al.  A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem , 2010, IEEE Transactions on Computers.

[25]  Jagdish Chandra Patra,et al.  Concurrent Error Detection in Bit-Serial Normal Basis Multiplication Over ${\rm GF}(2^{m})$ Using Multiple Parity Prediction Schemes , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[26]  Pierre-Louis Cayrel,et al.  McEliece/Niederreiter PKC: Sensitivity to Fault Injection , 2010, 2010 5th International Conference on Future Information Technology.

[27]  Arash Reyhani-Masoleh,et al.  Fault Detection Structures of the S-boxes and the Inverse S-boxes for the Advanced Encryption Standard , 2009, J. Electron. Test..

[28]  Arash Reyhani-Masoleh,et al.  A low-cost S-box for the Advanced Encryption Standard using normal basis , 2009, 2009 IEEE International Conference on Electro/Information Technology.

[29]  Erik Tews,et al.  Side Channels in the McEliece PKC , 2008, PQCrypto.

[30]  Francisco Rodríguez-Henríquez,et al.  A fast implementation of multiplicative inversion over GF(2/sup m/) , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[31]  M. Anwar Hasan,et al.  Error Detection in Polynomial Basis Multipliers over Binary Extension Fields , 2002, CHES.

[32]  Christof Paar,et al.  Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes , 2002, Des. Codes Cryptogr..

[33]  T. Itoh,et al.  A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..

[34]  Nicholas J. Patterson,et al.  The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.