efficient implementations of mqpks
play

Efficient Implementations of MQPKS Peter Czypek,Stefan Heyse, Enrico - PowerPoint PPT Presentation

Efficient Implementations of MQPKS on Constrained Devices Efficient Implementations of MQPKS Peter Czypek,Stefan Heyse, Enrico Thomae on Constrained Devices Peter Czypek, Stefan Heyse, Enrico Thomae CHES2012 11.09.2012 Ruhr-University Bochum |


  1. Efficient Implementations of MQPKS on Constrained Devices Efficient Implementations of MQPKS Peter Czypek,Stefan Heyse, Enrico Thomae on Constrained Devices Peter Czypek, Stefan Heyse, Enrico Thomae CHES2012 11.09.2012 Ruhr-University Bochum | Embedded Security 1

  2. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Motivation  Quantum computers can solve Discrete Logarithm problem and Factorization problem  Alternatives must be found  MQ based cryptography is one solution  Many MQ schemes were partially or fully broken in the past  Few implementations exist of the remaining schemes  Fair comparison of schemes was only possible theoretically Ruhr-University Bochum | Embedded Security 2

  3. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Goals  Implement • all currently secure schemes • with the same security level • configurable code • including all currently known optimizations  Show that MQ schemes are a good alternative to current schemes? Ruhr-University Bochum | Embedded Security 3

  4. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae MQ Signature Schemes - Basics  sign() maps the message to signature with the secret key  verify() maps the signature to message with the public key  If the verification result is not the original message, the signature is invalid  sign and verify are inverses of each other  verify(sign(message)) = message Ruhr-University Bochum | Embedded Security 4

  5. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae MQ Signature Schemes - Basics  Four maps exist in a general MQ scheme: P , S , F , and T  P is the composition of S , F , and T and is the public key, P = T ○ F ○ S  S , F , and T are the secret key Inversion ¡of ¡ P ¡is ¡hard ¡because ¡ P ¡is ¡a ¡large ¡MQ ¡system ¡ verify sign Ruhr-University Bochum | Embedded Security 5

  6. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Schemes UOV Rainbow enTTS Invert T Invert T Invert F Invert F Invert F Invert S Invert S Invert S Ruhr-University Bochum | Embedded Security 6

  7. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Linear Maps  Maps or transformations can also be seen as functions  There exist two types of maps in MQ schemes: linear and MQ maps  Linear maps mix variables and therefore “hide” existing structure Ruhr-University Bochum | Embedded Security 7

  8. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Linear Maps  S and T can be inverted by matrix inversion  Matrix inversion can be done by Gaussian elimination algorithm for each column of identity matrix  Inversion of a linear map is matrix vector multiplication with the inverse T -1 Ruhr-University Bochum | Embedded Security 8

  9. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Schemes UOV Rainbow enTTS Invert T Invert T Invert F Invert F Invert F Invert S Invert S Invert S Ruhr-University Bochum | Embedded Security 9

  10. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae MQ Maps  F and P are MQ maps  P has no special structure and is large, therefore hard to invert 3 x 1 x 1 + 8 x 1 x 2 + 5x 1 x 3 + 8 x 2 x 2 + 6x 2 x 3 + 2x 3 x 3 = m 1 1 x 1 x 1 + 7 x 1 x 2 + 9x 1 x 3 + 3 x 2 x 2 + 7x 2 x 3 + 2x 3 x 3 = m 2  A special structure in F is necessary to allow easy inversion  This special structure is hidden by S and T Ruhr-University Bochum | Embedded Security 10

  11. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - UOV  Two variable groups: Oil & Vinegar  Fix vinegar variables to make system linear  A quadratic linear equation system remains after fixing  Apply Gaussian elimination to get a solution for the oil variables Ruhr-University Bochum | Embedded Security 11

  12. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Schemes UOV Rainbow enTTS Invert T Invert T Invert F Invert F Invert F Invert S Invert S Invert S Ruhr-University Bochum | Embedded Security 12

  13. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - Rainbow  Two or more layers (like a Rainbow)  Solve first layer as normal UOV instance  In next layer fix vinegar variables not randomly but with solution from previous layer  Solve layer again with Gaussian elimination Rainbow(3,2,4) : x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 Ruhr-University Bochum | Embedded Security 13

  14. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Schemes UOV Rainbow enTTS Invert T Invert T Invert F Invert F Invert F Invert S Invert S Invert S Ruhr-University Bochum | Embedded Security 14

  15. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - enTTS Ruhr-University Bochum | Embedded Security 15

  16. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps – enTTS Ruhr-University Bochum | Embedded Security 16

  17. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - enTTS  enTTS Layer 1: • Fix x 1 to x 7 randomly • Multiply with coefficients to get a LES • Solve with Gaussian elimination enTTS(20,28) : x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12 x 13 x 14 x 15 x 16 x 17 x 18 x 19 x 20 x 21 x 22 x 23 x 24 x 25 x 26 x 27 Ruhr-University Bochum | Embedded Security 17

  18. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - enTTS  enTTS Layer 2: • Can be solved directly enTTS(20,28) : x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12 x 13 x 14 x 15 x 16 x 17 x 18 x 19 x 20 x 21 x 22 x 23 x 24 x 25 x 26 x 27 Ruhr-University Bochum | Embedded Security 18

  19. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Inverting Central Maps - enTTS  enTTS Layer 3: • Fix x 0 randomly • Multiply already known values with coefficients to get a LES • Solve LES enTTS(20,28) : x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x 10 x 11 x 12 x 13 x 14 x 15 x 16 x 17 x 18 x 19 x 20 x 21 x 22 x 23 x 24 x 25 x 26 x 27 Ruhr-University Bochum | Embedded Security 19

  20. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Schemes UOV Rainbow enTTS Invert T Invert T Invert F Invert F Invert F Invert S Invert S Invert S Ruhr-University Bochum | Embedded Security 20

  21. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Optimizations - Reduced Polynomials  Leaving out linear and constant terms in polynomials saves time and space  Can be applied to UOV and Rainbow  In the linear transformations the constant parts are also left out Ruhr-University Bochum | Embedded Security 21

  22. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Optimizations - Self Invertible Linear Maps  In case of UOV and Rainbow S can be chosen of the form:  S is self invertible S -1 = S ,so no inversion is necessary.  Multiplications in UOV signature generation are reduced from n·n to o·v  Private key is smaller Ruhr-University Bochum | Embedded Security 22

  23. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Optimizations - 0/1 UOV  0/1 UOV is an optimization for UOV  Petzold, Thomae, Wolf et. al showed that large parts of the public key can be chosen randomly fixed  This part can be treated as a system parameter and is not part of the public key anymore  Faster verification is possible because the arithmetic in GF(2) is easier: 1= copy or 0 = not • An additional check is necessary if an element is from GF(2) or GF(2 8 )  Key generation: First choose P and then calculate F Ruhr-University Bochum | Embedded Security 23

  24. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Implementation - Central Map Memory Mapping  Keys are saved without zeros  Serial read out using pointer++ Ruhr-University Bochum | Embedded Security 24

  25. Efficient Implementations of MQPKS on Constrained Devices Peter Czypek,Stefan Heyse, Enrico Thomae Implementation – Exponential Representation  GF(2 8 ) arithmetic with table look up  Multiplication is addition in exponent mod (2 m -1) mul(a,b) = exp(log(a)+log(b) mod (2 m -1)) 3 pgm_read()  Saving memory access by keeping temporary results in exponential representation when next operation is a multiplication mul( mul(a,b) , c ) = exp( log[ exp(log(a)+log(b) mod (2 m -1)) ]+log[c] mod (2 m -1)) 6 pgm_read() mul( mul(a,b) , c ) = exp( (log(a)+log(b) mod (2 m -1)) +log[c] mod (2 m -1)) 4 pgm_read()  Keys are saved in exponential representation, too. Ruhr-University Bochum | Embedded Security 25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend