Efficient Implementations of MQPKS on Constrained Devices
Autor: | Enrico Thomae, Stefan Heyse, Peter Czypek |
---|---|
Rok vydání: | 2012 |
Předmět: |
Scheme (programming language)
business.industry Computer science USable Computer security computer.software_genre Public-key cryptography Microcontroller Quadratic equation Computer engineering Unbalanced Oil and Vinegar business computer Implementation Quantum computer computer.programming_language |
Zdroj: | Cryptographic Hardware and Embedded Systems – CHES 2012 ISBN: 9783642330261 CHES |
DOI: | 10.1007/978-3-642-33027-8_22 |
Popis: | Multivariate Quadratic Public Key Schemes (MQPKS) attracted the attention of researchers in the last decades for two reasons. First they are thought to resist attacks by quantum computers and second, most of the schemes were broken. The latter may be the reason why implementations are rare. This work investigates one of the most promising member of MQPKS and its variants, namely UOV, Rainbow and enTTS. UOV resisted all kinds of attacks for 13 years and can be considered one of the best examined MQPKS. We describe implementations of UOV, Rainbow and enTTS on an 8-bit microcontroller. To address the problem of large keys, we used several optimizations and also implemented the 0/1-UOV scheme introduced at CHES 2011. To achieve a practically usable security level on the selected device, all recent attacks are summarized and parameters for standard security levels are given. To allow judgement of scaling, the schemes are implemented for the most common security levels in embedded systems 264, 280 and 2128 bits symmetric security. This allows for the first time a direct comparison of the four schemes because they are implemented for exactly the same security levels on the same platform and also by the same developer. |
Databáze: | OpenAIRE |
Externí odkaz: |