Abstract
Generating, uniformly at random, a binary or a ternary string with a fixed length L and a prescribed weight W, is a step in several quantum safe cryptosystems (e. g., BIKE, NTRUEncrypt, NTRU LPrime, Lizard, McEliece). This fixed weight vector selection generation is often implemented via a shuffling method or a rejection method, but not always in “constant time” side channel protected flow. A recently suggested constant time algorithm for this problem, uses Network Sorting and turns out to be quite efficient. This paper proposes a new method for this computation, with a side channel protected implementation. We compare it to the other methods for different combinations of L and W values. Our method turns out to be the fastest approach for the cases where L is (relatively) short and (formula presented). For example, this range falls within the parameters of NTRU LPrime, where our method achieves a 3× speedup in the string generation. This leads to an overall 1.14× speedup for the NTRU LPrime key generation.
Original language | English |
---|---|
Title of host publication | Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings |
Editors | Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung |
Publisher | Springer Verlag |
Pages | 141-155 |
Number of pages | 15 |
ISBN (Print) | 9783030209506 |
DOIs | |
State | Published - 2019 |
Event | 3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 - Beer Sheva, Israel Duration: 27 Jun 2019 → 28 Jun 2019 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11527 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 |
---|---|
Country/Territory | Israel |
City | Beer Sheva |
Period | 27/06/19 → 28/06/19 |
Bibliographical note
Publisher Copyright:© Springer Nature Switzerland AG 2019.
Keywords
- Coding
- Combinatorics
- Post Quantum Cryptography
- Software optimization
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science