后量子密码算法的软件实现研究
On Software Implementations of Post-Quantum Cryptography
周天 1郑昉昱 2林璟锵 3魏荣 2唐文煦1
作者信息
- 1. 中国科学技术大学网络空间安全学院,合肥 230026
- 2. 中国科学院大学密码学院,北京 100049
- 3. 中国科学技术大学网络空间安全学院,合肥 230026;北京中科研究院,北京 100193
- 折叠
摘要
基于公钥密码算法的各类安全技术已经成为了 目前网络空间安全的重要基石,在构建信任体系、保护传输安全、身份鉴别等方面发挥着举足轻重的作用.然而,利用Shor算法,量子计算机可以在多项式时间内破解RSA、ECC等当前主流公钥密码体制所依赖的数学困难问题.随着量子计算技术的发展,这一安全威胁日益迫近,所以学术界和工业界都致力于研制抵御量子计算机攻击的公钥密码体制.NIST后量子密码标准化项目是目前最具代表性的项目之一,它于2017年征集了数量众多、种类多样的后量子密码方案,目前已产生阶段性结果.除了算法安全性分析之外,各后量子密码算法的软件实现性能也是该项目评价其优劣的重要指标之一.本文围绕六类主要的后量子密码算法,以密码算法软件实现的视角,详细分析了每一类的代表方案及其主要计算负载、优化算法以及软件实现特点;并基于x86和ARM平台,全面梳理和总结了各文献中提出的、特定类型算法的加速技术和通用优化方法.
Abstract
Various fundamental technologies based on the public-key cryptography become an im-portant cornerstone of cyberspace security,and play a pivotal role in building a system of trust,pro-vide data transmission security and authentication,etc.However,with the development of quantum computing technology,with Shor's algorithm,quantum computers are able to solve many mathemat-ically difficult problems in polynomial time,these problems are the bases for the security of current mainstream public key cryptosystems such as RSA and ECC,which means that these public key cryp-tosystems are no longer safe.Faced with this looming threat,both academia and industry are working to develop public-key cryptosystems that are resistant to attacks from quantum computers.The NIST Post-Quantum Cryptography Standardization Project is one of the most representative projects.In 2017,it solicited the research community to propose a large number of post-quantum cryptographic schemes of different variety,and phased results have been produced.In addition to the basic secu-rity analysis,the performance of the software implementation is one of the important metrics when evaluating each post-quantum cryptographic algorithm.This paper focuses on six main types of post-quantum cryptosystems from the perspective of software implementation of cryptographic algorithms,and analyzes in detail the representative schemes of each type,their main computing load,optimization algorithms,and software implementation characteristics.Based on x86 and ARM platforms,this pa-per systematically lists and comprehensively summarizes the algorithm-specific acceleration techniques and general optimization methods proposed in various literature.
关键词
公钥密码/后量子密码/软件实现/格密码算法Key words
public-key cryptography/post-quantum cryptography/software cryptographic imple-mentation/lattice-based cryptography引用本文复制引用
基金项目
国家重点研发计划(2020YFB1005803)
国家自然科学基金(61902392)
出版年
2024