Using the New VPMADD Instructions for the New Post Quantum Key Encapsulation Mechanism SIKE

Dusan Kostic, Shay Gueron

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper demonstrates the use of new processor instructions VPMADD, intended to appear in the coming generation of Intel processors (codename 'Cannon Lake'), in order to accelerate the newly proposed key encapsulation mechanism (KEM) named SIKE. SIKE is one of the submissions to the NIST standardization process on post-quantum cryptography, and is based on pseudo-random walks in supersingular isogeny graphs. While very small keys are the main advantage of SIKE, its extreme computational intensiveness makes it one of the slowest KEM proposals. Performance optimizations are needed. We address here the 'Level 1' parameters that target 64-bit quantum security, and deemed sufficient for the NIST standardization effort. Thus, we focus on SIKE503 that operates over Fp2 with a 503-bit prime p. These short operands pose a significant challenge on using VPMADD effectively. We demonstrate several optimization methods to accelerate Fp, Fp2, and the elliptic curve arithmetic, and predict a potential speedup by a factor of 1.72x.

Original languageEnglish
Title of host publicationProceedings - 26th IEEE Symposium on Computer Arithmetic, ARITH 2019
EditorsNaofumi Takagi, Sylvie Boldo, Martin Langhammer
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages215-218
Number of pages4
ISBN (Electronic)9781728133669
DOIs
StatePublished - Jun 2019
Externally publishedYes
Event26th IEEE Symposium on Computer Arithmetic, ARITH 2019 - Kyoto, Japan
Duration: 10 Jun 201912 Jun 2019

Publication series

NameProceedings - Symposium on Computer Arithmetic
Volume2019-June

Conference

Conference26th IEEE Symposium on Computer Arithmetic, ARITH 2019
Country/TerritoryJapan
CityKyoto
Period10/06/1912/06/19

Bibliographical note

Funding Information:
Acknowledgements. This research was supported by: The Israel Science Foundation (grant No. 1018/ 16); The BIU Center for Research in Applied Cryptography and Cyber Security, in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office; the Center for Cyber Law & Policy at the University of Haifa, in conjunction with the Israel National Cyber Directorate in the Prime Minister’s Office.

Publisher Copyright:
© 2019 IEEE.

Keywords

  • VPMADD processor instructions, software optimization, post quantum cryptography, supersingular isogeny

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Using the New VPMADD Instructions for the New Post Quantum Key Encapsulation Mechanism SIKE'. Together they form a unique fingerprint.

Cite this