Generating, uniformly at random, a binary or a ternary string with a fixed length L and a prescribed weight W, is a step in several quantum safe cryptosystems (e.Â g., BIKE, NTRUEncrypt, NTRU LPrime, Lizard, McEliece). This fixed weight vector selection generation is often implemented via a shuffling method or a rejection method, but not always in “constant time” side channel protected flow. A recently suggested constant time algorithm for this problem, uses Network Sorting and turns out to be quite efficient. This paper proposes a new method for this computation, with a side channel protected implementation. We compare it to the other methods for different combinations of L and W values. Our method turns out to be the fastest approach for the cases where L is (relatively) short and (formula presented). For example, this range falls within the parameters of NTRU LPrime, where our method achieves a 3× speedup in the string generation. This leads to an overall 1.14× speedup for the NTRU LPrime key generation.
|Title of host publication||Cyber Security Cryptography and Machine Learning - 3rd International Symposium, CSCML 2019, Proceedings|
|Editors||Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung|
|Number of pages||15|
|State||Published - 2019|
|Event||3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019 - Beer Sheva, Israel|
Duration: 27 Jun 2019 → 28 Jun 2019
|Name||Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)|
|Conference||3rd International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019|
|Period||27/06/19 → 28/06/19|
Bibliographical noteFunding Information:
Acknowledgments. We thank an anonymous reviewer for the comment that led to Algorithm 6. This research was supported by: The Israel Science Foundation (grant No. 1018/ 16); The BIU Center for Research in Applied Cryptography and Cyber Security, in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office; the Center for Cyber Law & Policy at the University of Haifa in conjunction with the Israel National Cyber Directorate in the Prime Minister’s Office.
© Springer Nature Switzerland AG 2019.
- Post Quantum Cryptography
- Software optimization
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science (all)