양자 내성 암호 최신 소프트웨어 구현 동향

  • 박태환 (부산대학교 전기전자컴퓨터공학과) ;
  • 서화정 (한성대학교 IT융합공학부) ;
  • 이가람 (부산대학교 전기전자컴퓨터공학과) ;
  • 김호원 (부산대학교 전기전자컴퓨터공학과)
  • Published : 2017.12.31

Abstract

최근 양자 컴퓨터 기술의 발전에 따라 기존에 많이 사용하고 있는 대칭키 암호와 공개키 암호의 보안 위험성이 고려되어야하며, 이에 따라 양자 컴퓨터 환경에서도 보안성을 제공할 수 있는 암호 알고리즘인 양자 내성 암호에 대한 연구가 활발히 이루어지고 있으며, 이와 관련하여 미국 NIST의 양자 내성 암호 표준 공모전이 진행중에 있다. 본 논문에서는 양자 내성 암호별 다양한 플랫폼/디바이스 환경 및 언어 기반의 최신 소프트웨어 구현 동향을 살펴본다.

Keywords

References

  1. Son, Yongha. "A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE." Information Security and Cryptology--ICISC 2016: 19th International Conference, Seoul, South Korea, November 30--December 2, 2016, Revised Selected Papers. Vol. 10157. Springer, 2017.
  2. Cheon, J. H., Kim, D., Lee, J., & Song, Y. S. "Lizard: Cut off the Tail!//Practical Post- Quantum Public-Key Encryption from LWE and LWR." IACR Cryptology ePrint Archive 2016 (2016): 1126.
  3. Bos, Joppe, et al. "CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM." IACR Cryptology ePrint Archive 2017 (2017): 634.
  4. Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J. M., & Stehle, D. "High-speed key encapsulation from NTRU." International Conference on Cryptographic Hardware and Embedded Systems, pp. 232-252. Springer, Cham, 2017.
  5. Guillen, O. M., Poppelmann, T., Mera, J. M. B., Bongenaar, E. F., Sigl, G., Sepulveda, J. (2017). "Towards post-quantum security for IoT endpoints with NTRU", In 2017 Design, Automation & Test in Europe Conference & Exhibition(DATE), IEEE, pp. 698-703.
  6. T. Oder, T. Poppelmann, and T. Guneysu. "Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained Devices", 51st Annual Design Automation Conference(DAC), pp. 1-6, 2014.
  7. R. De Clercq, S. S. Roy, F. Vercauteren, and I. Verbauwhede, "Efficient Software Implementation of Ring-LWE Encryption", 18th Design, Automation & Test in Europe Conference & Exhibition, pp. 339-344, 2015.
  8. T. Poppelmann, T. Oder, and T. Guneysu, "High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers", In International Conference on Cryptology and Information Security in Latin America, pages 346-365. Springer, 2015.
  9. Z. Liu, H. Seo, S. S. Roy, J. GroBschadl, H. Kim, and I. Verbauwhede, "Efficient Ring-LWE encryption on 8-bit AVR processors", In International Workshop on Cryptographic Hardware and Embedded Systems, pages 663-682. Springer, 2015.
  10. Z. Liu, T. Poppelmann, T. Oder, H. Seo, S. S. Roy, T. Guneysu, J. Groschadl, H. Kim, and I. Verbauwhede, "High-performance ideal latticebased cryptography on 8-bit AVR microcontrollers", ACM Transactions on Embedded Computing Systems (TECS), 16(4):117, pp. 1-20, 2017.
  11. Z. Liu, R. Azarderakhsh, H. Kim, and H. Seo, "Efficient software implementation of Ring- LWE encryption on IoT processors", IEEE Transactions on Computers, pp. 1-11, 2017.
  12. Z. Liu, H. Seo, J. GroBschadl, and H. Kim, "Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes", IEEE Transactions on Information Forensics and Security, 11(7), pp. 1385-1397, 2016. https://doi.org/10.1109/TIFS.2015.2491261
  13. Hwajung Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, and Howon Kim, "Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors", International Conference on Information Security and Cryptology. Springer, Cham, pp. 1-14, 2017.
  14. Bernstein, Daniel J., Tung Chou, and Peter Schwabe. "McBits: fast constant-time code-based cryptography." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 250-272, 2013.
  15. Misoczki, R., Tillich, J. P., Sendrier, N., & Barreto, P. S. "MDPC-McEliece: New McEliece variants from moderate density parity-check codes." Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE, pp. 2069-2073, 2013.
  16. Heyse, Stefan, Ingo Von Maurich, and Tim Guneysu. "Smaller keys for code-based cryptography: QC-MDPC McEliece implementations on embedded devices." International Workshop on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, pp.273-292, 2013.
  17. Von Maurich, Ingo, and Tim Guneysu. "Towards Side-Channel Resistant Implementations of QC-MDPC McEliece Encryption on Constrained Devices." PQCrypto 2014, pp. 266-282, 2014
  18. Maurich, Ingo Von, Tobias Oder, and Tim Guneysu. "Implementing QC-MDPC McEliece Encryption." ACM Transactions on Embedded Computing Systems (TECS) 14.3 (2015): 44., pp. 1-25, 2015
  19. Chou, Tung. "QcBits: constant-time small-key code-based cryptography." International Conference on Cryptographic Hardware and Embedded Systems. Springer Berlin Heidelberg, 2016.(0), pp. 280-300, 2016
  20. Barreto, P. S., Gueron, S., Guneysu, T., Misoczki, R., Persichetti, E., Sendrier, N., & Tillich, J. P. "CAKE: Code-Based Algorithm for Key Encapsulation." IMA International Conference on Cryptography and Coding. Springer, Cham, 2017.(0), pp. 207-226, 2017
  21. Chou, Tung. "McBits revisited." International Conference on Cryptographic Hardware and Embedded Systems. Springer, Cham, pp. 213-231, 2017.
  22. A. Petzoldt, M-S Chen, B-Y Yang, C. Tao, and J. Ding, "Design Principles for HFEv- based Multivariate Signature Schemes", Advances in Cryptology: ASIACRYPT2015, LNCS 9452, pp. 311-334, 2015.
  23. D. H. Duong, T. Yasuda, A. Petzoldt, Y. Wang and T. Takagi, "Revisiting the Cubic UOV Signature Scheme", ICISC 2016, LNCS 10157, pp. 223-238, 2016.
  24. Petzoldt, Albrecht, Alan Szepieniec, and Mohamed Saied Emam Mohamed. "A Practical Multivariate Blind Signature Scheme." IACR Cryptology ePrint Archive 2017 (2017): 131., pp. 1-21, 2017
  25. Chen, M. S., Li, W. D., Peng, B. Y., Yang, B. Y., & Cheng, C. M. "Implementing 128-bit Secure MPKC Signatures." Cryptology ePrint Archive, Report 2017/636, pp. 1-32, 2017.
  26. Peng, Zhiniang, and Shaohua Tang. "Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation." IEEE Access 5 (2017), pp. 11877-11886., 2017 https://doi.org/10.1109/ACCESS.2017.2717279
  27. De Feo, L., Jao, D., Plut, J., "Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.", Journal of Mathematical Cryptology 8(3), pp. 209-247, September 2014
  28. Costello, C., Longa, P., Naehrig, M., "Efficient Algorithms for Supersingular Isogeny Diffie-Hellman", Advances in Cryptology- CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer Berlin Heidelberg, Berlin, Heidelberg (2016), pp. 572-601, 2016
  29. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C., "Key compression for isogeny-based cryptosystems.", Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography. AsiaPKC '16, New York, NY, USA, ACM, pp. 1-10, 2016
  30. Koziel, B., Jalali, A., Azarderakhsh, R., Jao, D., & Mozaffari-Kermani, M. "NEON-SIDH: efficient implementation of supersingular isogeny Diffie-Hellman key exchange protocol on ARM." International Conference on Cryptology and Network Security. Springer International Publishing, pp. 88-103, 2016
  31. Yoo, Y., Azarderakhsh, R., Jalali, A., Jao, D., & Soukharev, V. "A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies." IACR Cryptology ePrint Archive 2017 (2017): 186., pp. 1-18, 2017
  32. Costello, C., Jao, D., Longa, P., Naehrig, M., Renes, J., & Urbanik, D. "Efficient compression of SIDH public keys." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Cham, pp. 279-706, 2017.
  33. Bernstein, D. J., Hopwood, D., Hülsing, A., Lange, T., Niederhagen, R., Papachristodoulou, L., & Wilcox-O'Hearn, Z. "SPHINCS: practical stateless hash-based signatures." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, pp. 368-397, 2015.
  34. Hulsing, Andreas, Joost Rijneveld, and Peter Schwabe. "ARMed SPHINCS." Public-Key Cryptography-PKC 2016. Springer Berlin Heidelberg, 2016, pp. 446-470, 2016
  35. Gueron, Shay, and Nicky Mouha. "SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security." Cryptology ePrint Archive, Report 2017/645, pp. 1-12, 2017
  36. Kolbl, Stefan. "Putting Wings on SPHINCS." PQCrypto 2017, pp. 1-20, 2017