| 注册
首页|期刊导航|密码学报|后量子密码算法的软件实现研究

后量子密码算法的软件实现研究

周天 郑昉昱 林璟锵 魏荣 唐文煦

密码学报2024,Vol.11Issue(2):308-343,36.
密码学报2024,Vol.11Issue(2):308-343,36.DOI:10.13868/j.cnki.jcr.000681

后量子密码算法的软件实现研究

On Software Implementations of Post-Quantum Cryptography

周天 1郑昉昱 2林璟锵 3魏荣 2唐文煦1

作者信息

  • 1. 中国科学技术大学网络空间安全学院,合肥 230026
  • 2. 中国科学院大学密码学院,北京 100049
  • 3. 中国科学技术大学网络空间安全学院,合肥 230026||北京中科研究院,北京 100193
  • 折叠

摘要

Abstract

Various fundamental technologies based on the public-key cryptography become an im-portant cornerstone of cyberspace security,and play a pivotal role in building a system of trust,pro-vide data transmission security and authentication,etc.However,with the development of quantum computing technology,with Shor's algorithm,quantum computers are able to solve many mathemat-ically difficult problems in polynomial time,these problems are the bases for the security of current mainstream public key cryptosystems such as RSA and ECC,which means that these public key cryp-tosystems are no longer safe.Faced with this looming threat,both academia and industry are working to develop public-key cryptosystems that are resistant to attacks from quantum computers.The NIST Post-Quantum Cryptography Standardization Project is one of the most representative projects.In 2017,it solicited the research community to propose a large number of post-quantum cryptographic schemes of different variety,and phased results have been produced.In addition to the basic secu-rity analysis,the performance of the software implementation is one of the important metrics when evaluating each post-quantum cryptographic algorithm.This paper focuses on six main types of post-quantum cryptosystems from the perspective of software implementation of cryptographic algorithms,and analyzes in detail the representative schemes of each type,their main computing load,optimization algorithms,and software implementation characteristics.Based on x86 and ARM platforms,this pa-per systematically lists and comprehensively summarizes the algorithm-specific acceleration techniques and general optimization methods proposed in various literature.

关键词

公钥密码/后量子密码/软件实现/格密码算法

Key words

public-key cryptography/post-quantum cryptography/software cryptographic imple-mentation/lattice-based cryptography

分类

信息技术与安全科学

引用本文复制引用

周天,郑昉昱,林璟锵,魏荣,唐文煦..后量子密码算法的软件实现研究[J].密码学报,2024,11(2):308-343,36.

基金项目

国家重点研发计划(2020YFB1005803) (2020YFB1005803)

国家自然科学基金(61902392)National Key Research and Development Program of China(2020YFB1005803) (61902392)

National Natural Science Foundation of China(61902392) (61902392)

密码学报

OA北大核心CSTPCD

2095-7025

访问量0
|
下载量0
段落导航相关论文