A masked ring-LWE implementation

Oscar Reparaz*, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Abstract

Lattice-based cryptography has been proposed as a postquantum public-key cryptosystem. In this paper, we present a masked ring-LWE decryption implementation resistant to first-order side-channel attacks. Our solution has the peculiarity that the entire computation is performed in the masked domain. This is achieved thanks to a new, bespoke masked decoder implementation. The output of the ring-LWE decryption are Boolean shares suitable for derivation of a symmetric key. We have implemented a hardware architecture of the masked ring-LWE processor on a Virtex-II FPGA, and have performed side channel analysis to confirm the soundness of our approach. The area of the protected architecture is around 2000 LUTs, a 20% increase with respect to the unprotected architecture. The protected implementation takes 7478 cycles to compute, which is only a factor ×2. 6 larger than the unprotected implementation.

Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems - CHES 2015
Subtitle of host publication17th International Workshop Saint-Malo, France, September 13–16, 2015 Proceedings
EditorsTim Güneysu, Helena Handschuh
PublisherSpringer Verlag
Pages683-702
ISBN (Electronic)9783662483244
ISBN (Print)9783662483237
DOIs
Publication statusPublished - 1 Sept 2015
EventInternational Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015 - Saint-Malo, France
Duration: 13 Sept 201516 Sept 2015

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume9293
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Workshop on Cryptographic Hardware and Embedded Systems, CHES 2015
Country/TerritoryFrance
CitySaint-Malo
Period13/09/1516/09/15

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A masked ring-LWE implementation'. Together they form a unique fingerprint.

Cite this