請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/64760
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 鄭振牟 | |
dc.contributor.author | Jie-Ren Shih | en |
dc.contributor.author | 施傑仁 | zh_TW |
dc.date.accessioned | 2021-06-16T22:58:42Z | - |
dc.date.available | 2013-08-10 | |
dc.date.copyright | 2012-08-10 | |
dc.date.issued | 2012 | |
dc.date.submitted | 2012-08-08 | |
dc.identifier.citation | [ABF+08] Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid Verbauwhede, Siddika
Berna Ors, and Siddika Berna Ors. Low-cost implementations of ntru for pervasive security. In ASAP, pages 79{84, 2008. [BCB+08] Sundar Balasubramanian, Harold W. Carter, Andrey Bogdanov, Andy Rupp, Jintai Ding, and Jintai Ding. Fast multivariate signature generation in hardware: The case of rainbow. In ASAP, pages 25{30, 2008. [BCE+01] Daniel V. Bailey, Daniel Co n, Adam J. Elbirt, Joseph H. Silverman, Adam D. Woodbury, and Adam D. Woodbury. Ntru in constrained devices. In CHES, pages 262{272, 2001. [BER+08] Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp, Christopher Wolf, and Christopher Wolf. Time-area optimized public-key engines: - cryptosystems as replacement for elliptic curves?. In CHES, pages 45{ 61, 2008. [Ber10] Daniel J. Bernstein. Grover vs. mceliece. In PQCrypto, pages 73{80, 2010. [Ber11] Daniel J. Bernstein. Post-quantum cryptography. In Encyclopedia of Cryptography and Security (2nd Ed.), pages 949{950, 2011. [CCC+09] Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin 35 Yang, and Bo-Yin Yang. Sse implementation of multivariate pkcs on modern x86 cpus. In CHES, pages 33{48, 2009. [DDD05] Nirav Hemant Dave, Nirav Hemant Dave, and Nirav Hemant Dave. Designing a processor in bluespec. 2005. [DSS05] Jintai Ding, Dieter Schmidt, and Dieter Schmidt. Rainbow, a new multivariable polynomial signature scheme. In ACNS, pages 164{175, 2005. [DYB+09] Jintai Ding, Bo-Yin Yang, Daniel J. Bernstein, Johannes Buchmann, and Erik Dahmen. Multivariate Public Key Cryptography, pages 193{ 241. Springer Berlin Heidelberg, 2009. [HPSS98] Je rey Ho stein, Jill Pipher, Joseph H. Silverman, and Joseph H. Silverman. Ntru: A ring-based public key cryptosystem. pages 267{288, 1998. [KSWW04] Chris Karlof, Naveen Sastry, David Wagner, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. pages 162{175, 2004. [MWSS04] David J. Malan, Matt Welsh, Michael D. Smith, and Michael D. Smith. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. pages 71{80, 2004. [Nik04] Rishiyur S. Nikhil. Bluespec system verilog: e cient, correct rtl from high level speci cations. In MEMOCODE, pages 69{70, 2004. [O'R02] Colleen Marie O'Rourke. E cient ntru implementations. 2002. [PSWW04] Adrian Perrig, John A. Stankovic, David Wagner, and David Wagner. Security in wireless sensor networks. pages 53{57, 2004. 36 [SCC97] Peter W. Shor, Siam J. Comput C, and Siam J. Comput C. Polynomialtime algorithms for prime factorization and discrete logarithms on a quantum computer. pages 1484{1509, 1997. [TYD+11] Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen 0004, Guomin Chen, and Guomin Chen. High-speed hardware implementation of rainbow signature on fpgas. In PQCrypto, pages 228{243, 2011. [WKfC+04] Ronald J. Watro, Derrick Kong, Sue fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus, and Peter Kruus. Tinypk: securing sensor networks with public key technology. In SASN, pages 59{64, 2004. [YCC+06] Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen, Jiun-Ming Chen, and Jiun-Ming Chen. Implementing minimized multivariate pkc on lowresource embedded systems. In SPC, pages 73{88, 2006. [YCCC04] Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen, and Yen-Hung Chen. Tts: High-speed signatures on a low-cost smart card. In CHES, pages 371{385, 2004. [ZFZZ08] Yun Zhou, Yuguang Fang, Yanchao Zhang, and Yanchao Zhang. Securing wireless sensor networks: A survey. pages 6{28, 2008. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/64760 | - |
dc.description.abstract | In this paper, we present an ASIC implementation of two post-quantum publickey
cryptosystems (PKCs), NTRUEncrypt and TTS. It represents a rst step toward securing M2M systems using strong, hardware-assisted PKC. In contrast to the conventional wisdom that PKC is too 'expensive' for M2M sensors, it actually can lower the total cost of ownership because of cost savings in provision, deployment, operation, maintenance, and general management. Furthermore, PKC can be more energy-e cient because PKC-based security protocols usually involve less communication than their symmetric-key-based counterparts, and communication is getting relatively more and more expensive compared with computation. More importantly, recent algorithmic advances have brought several new PKCs, NTRUEncrypt and TTS included, that are orders of magnitude more e cient than traditional PKCs such as RSA. It is therefore our primary goal in this paper to demonstrate the feasibility of using hardware-based PKC to provide general data security in M2M applications. | en |
dc.description.provenance | Made available in DSpace on 2021-06-16T22:58:42Z (GMT). No. of bitstreams: 1 ntu-101-R99921028-1.pdf: 2803788 bytes, checksum: 65dde6c2da0781cf81fd930464411365 (MD5) Previous issue date: 2012 | en |
dc.description.tableofcontents | 1 Introduction 1
1.1 Previous attempts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 Algorithm 6 2.1 NTRUEncrypt Public Key Cryptosystem . . . . . . . . . . . . . . . . 7 2.1.1 Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.1.2 Previous attempts . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2 Multivariate Cryptography . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.1 General structure . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.2.2 TTS and related schemes . . . . . . . . . . . . . . . . . . . . . 12 2.2.3 Previous attempts . . . . . . . . . . . . . . . . . . . . . . . . 14 2.3 Solving systems of linear equations . . . . . . . . . . . . . . . . . . . 14 2.3.1 Systolic Gaussian elimination . . . . . . . . . . . . . . . . . . 14 2.3.2 The Wiedemann algorithm . . . . . . . . . . . . . . . . . . . . 15 3 Implementation 19 3.1 Bluespec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.1 Bluespec basics . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2 Modules and interfaces . . . . . . . . . . . . . . . . . . . . . . 20 3.1.3 Atomic actions and rules . . . . . . . . . . . . . . . . . . . . . 20 i 3.1.4 Fast compilation and simulation . . . . . . . . . . . . . . . . . 21 3.1.5 Atom-based design . . . . . . . . . . . . . . . . . . . . . . . . 21 3.1.6 Array-based design . . . . . . . . . . . . . . . . . . . . . . . . 22 3.2 Processor-based design . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4 Experiment Result 24 4.0.1 NTRUEncrypt ASIC . . . . . . . . . . . . . . . . . . . . . . . 24 4.0.2 Atom-based approach . . . . . . . . . . . . . . . . . . . . . . . 24 4.0.3 Array-based design . . . . . . . . . . . . . . . . . . . . . . . . 26 4.1 TTS ASIC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.1.1 Processor-based design . . . . . . . . . . . . . . . . . . . . . . 30 4.2 Verilog versus Bluespec Verilog . . . . . . . . . . . . . . . . . . . . . 31 5 Conclusion 33 | |
dc.language.iso | en | |
dc.title | 格向量及多變量後量子密碼系統實作 | zh_TW |
dc.title | An e cient ASIC implementation of Lattice-based and Multivariate Post-Quantum Cryptography | en |
dc.type | Thesis | |
dc.date.schoolyear | 100-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 楊柏因,陳君明 | |
dc.subject.keyword | 格基式密碼系統,多變量密碼系統,特殊應用積體電路,處理器,Bluespec Verilog, | zh_TW |
dc.subject.keyword | lattice-based Cryptography,Multivariate Cryptography,ASIC,processor-based design,Bluespec SystemVerilog, | en |
dc.relation.page | 37 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2012-08-08 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電機工程學研究所 | zh_TW |
顯示於系所單位: | 電機工程學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-101-1.pdf 目前未授權公開取用 | 2.74 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。