Evaluation of Lattice-Based Signature Schemes in Embedded Systems

Evaluation of Lattice-Based Signature Schemes in Embedded Systems

Evaluation of Lattice-Based Signature Schemes in Embedded Systems Tim Guneysu¨ Markus Krausz Tobias Oder Julian Speith Ruhr-Universitat¨ Bochum & DFKI Ruhr-Universitat¨ Bochum Ruhr-Universitat¨ Bochum Ruhr-Universitat¨ Bochum Bochum, Germany Bochum, Germany Bochum, Germany Bochum, Germany [email protected] [email protected] [email protected] [email protected] Abstract—Lattice-based cryptography is a promising candi- ate advanced constructions, like identity-based encryption. In date and remedy in public-key cryptography in case quantum general, there are two approaches to lattice-based signatures. computers become feasible or a major breakthrough in solving The first one is the hash-and-sign approach [11], [12] that the factorization problem or the discrete logarithm problem is achieved. Due to ongoing research in this field, many schemes still requires a trapdoor sampler, and the Fiat-Shamir approach [8], lack implementations that examine their practicability, especially [9], [13] that turns a zero-knowledge proof into a signature for embedded systems. In this work we discuss the potential scheme. In this work we discuss the typical implementation of lattice-based signature schemes for practical applications on challenges of lattice-based signature schemes and evaluate constrained devices in a post-quantum era. We focus on the selected schemes on a ARM Cortex-M4F microcontroller schemes GLP, BLISS, and Dilithium and discuss their unique properties as well as challenges regarding their implementation platform or review existing microcontroller implementations on embedded devices. In this regard we present and review of these schemes. As Fiat-Shamir signature schemes usually optimized implementations of these schemes for ARM Cortex- are more efficient than hash-and-sign signature schemes and M4 microcontrollers to evaluate the practical performance of therefore better suited for an implementation on a microcon- the schemes. troller device, we will focus on the Fiat-Shamir schemes GLP Index Terms—lattices, signatures, microcontroller, dilithium [13], BLISS [8], and Dilithium [9]. I. INTRODUCTION A. Contribution Digital signatures are a fundamental asymmetric crypto- In this work, we provide a comprehensive survey of the graphic primitive with numerous applications in our daily life. three signature schemes GLP, BLISS, and Dilithium. We Every digital transaction that requires authenticity and integrity analyze the evolution of lattice-based signature schemes and requires a digital signature over the message or document. highlight unique properties of each scheme. We present the Currently deployed signature schemes, like RSA, DSA, or up to our knowledge first ARM Cortex-M implementation of elliptic curve-based solutions, base their security on either the GLP signature scheme and present an optimized imple- the factorization problem or the discrete logarithm problem. mentation of Dilithium. To complete the picture we review Ever since Peter Shor developed a quantum algorithm that is implementations of BLISS and its variant BLISS-B to show able to solve both problems in polynomial time in 1997 [20], the different requirements that these schemes have regarding quantum-secure alternatives have gained a lot of attention. the target platform. Classical signature schemes are present on millions of B. Related Work devices in the Internet of Things. Regarding the fact that these devices are often deployed in the field for years, a The GLP scheme has been presented in [13] and an op- transition to post-quantum cryptography must take place in the timized AVX implementation of the scheme can be found in foreseeable future. For this transition it is essential to evaluate [14]. BLISS [8] and its improvement BLISS-B [7] have micro- and assess the suitability of post-quantum signature scheme controller implementations on AVR [15] and ARM Cortex-M4 for contemporary embedded applications. [19], [21]. Dilithium has been published at TCHES’18 [10] The National Institute of Standards and Technology even and has been submitted to the NIST standardization process started a standardization process for post-quantum cryptogra- [9]. phy that also takes into account how the submitted schemes II. EVOLUATION OF LATTICE-BASED SIGNATURE perform on a large number of target platforms. Among the SCHEMES NIST submissions, four major classes of quantum-secure In this section, we review the discussed schemes, GLP [13], mathematical problems emerged: based on hash functions, on BLISS [7], [8], and Dilithium [9]. For the sake of simplicity, linear codes, on lattices, and on multivariate quadratics. In this we present high-level descriptions of these schemes and refer work we will focus on signature schemes based on lattices. Lattice-based schemes offer comparatively high performance, 0This work was partially funded by the European Union H2020 SAFEcrypto reasonable parameter sizes, and the versatility to also instanti- project (grant no. 644729). to the respective original publications for full details and determines whether Sc is added to or subtracted from y. The security proofs. changes in BLISS lead to a signature size of only 5.6 kbit instead of 9.0 kbit for GLP. Another improvement is that in A. Notation GLP, there are on average seven repetitions for each signing n Polynomials in Rq = Zq[x]=hx + 1i are labeled by bold attempt while BLISS has a rejection rate of only 1.6. Signing lower case letters. Bold upper case letters denote matrices. The and verification of BLISS is sketched in Algorithms 3 and 4. Gaussian distribution with standard deviation σ is denoted by Dσ. Algorithm 3: BLISS SIGNING ALGORITHM B. Signature Scheme: GLP Input: Key pair (A; S) such that AS = q mod 2q, message m 2 f0; 1g∗ The GLP scheme is an extension of the work by Lyuba- Output:z ; c shevsky [16], [17]. The private key is made of two polynomials $ m 1 y − Dσ s1; s2 with random ternary coefficients, i.e. coefficients in 2 c H(Ay mod 2q, m) {−1; 0; 1g. The public key consists of a globally constant 3 Choose random bit b 2 f0; 1g polynomial a and another polynomial t as1 + s2. The b 4 z y + (−1) Sc signing and verification procedures are sketched in Algorithms 5 Continue with a probability 1 and 2. Two masking polynomials y ; y are sampled that 1 2 jjScjj2 hz,Sci are used to hide the secret key in the signature. The message 1 M exp − 2σ2 cosh σ2 otherwise together with the masking polynomials and the global constant restart a is given as input to a random oracle (typically instantiated by a hash function) as required by the Fiat-Shamir transform. If the coefficients of the signature polynomials z1; z2 exceed a Algorithm 4: BLISS VERIFICATION ALGORITHM certain threshold (defined by the parameter k), the signature is Input: Public key A, signature z, c 2 f0; 1g160, rejected. The verification checks the validity of the signature message m 2 f0; 1g∗ with the help of the public key. The proposed parameters Output: Accept (valid) or Reject (invalid) provide a security of 80 bits pre-quantum security [14]. 1 Accept if 2 z does not exceed bounds and Algorithm 1: GLP SIGNING ALGORITHM 3 c =H(Az + qc mod 2q, m) n ∗ Input:s 1; s2 2 [−1; 1] , message m 2 f0; 1g n 160 Output:z 1; z2 2 [−(k − 32); k − 32] , c 2 f0; 1g There is also an improvement to BLISS called BLISS-B [7] $ n 1 y1; y2 − [−k; k] that has an improved key generation and achieves a rejection 2 c H(ay1 + y2, m) rate of 1.4 for signing for the same security level of 128 bits 3 z1 s1c + y1, z2 s2c + y2 of pre-quantum security. n 4 if z1 or z262[−(k − 32); k − 32] then D. Signature Scheme: Dilithium 5 go to step 1 One major property of GLP and BLISS is that they are based on ideal lattices which means that the underlying lattice is structured. To this day, there is no attack known that exploits Algorithm 2: GLP VERIFICATION ALGORITHM this structure and is more efficient than other attacks but it 0 n is not clear if there might be such an attack in the future. Input: z1; z2 2 [−(k − 32); k − 32] , t 2 Rq, c 2 f0; 1g160, message m 2 f0; 1g∗ Therefore the designers of Dilithium made a more conservative Output: Accept (valid) or Reject (invalid) choice and select module lattices as security foundation of their scheme. In ideal lattices all arithmetic is carried out on 1 Accept if n polynomials. Module lattices rather consist of (small) matrices 2 z1, z2 2 [−(k − 32); k − 32] and in which the matrix elements are polynomials. Obviously, this 3 c =H(az1 + z2 − tc, m) results in larger parameter sizes and slower computations. Algorithms 5 and 6 show the signing and verification of Dilithium. Table I provides a comparison of signature and C. Signature Scheme: BLISS key size for the three discussed schemes. We compare the With the objective to reduce the signature size further, instantiations of the schemes that were implemented. The Ducas et al. developed the signature scheme BLISS [8]. One Roman numeral behind the name of the scheme in Table I major difference to GLP is that the masking polynomial y refers to the parameter set that was implemented. is distributed according to a Gaussian distribution instead of being uniformly distributed in a small interval. Furthermore III. IMPLEMENTATION the rejection step is performed according to a bimodal Gaus- Implementing a lattice-based signature scheme on embed- sian. This can be seen in the choice of the random bit b that ded devices poses a number of challenges to the developer. All Algorithm 5: DILITHIUM SIGNING ALGORITHM too big to be stored in a single register. All schemes require to draw samples from some kind of Input: Key pair ((A; t); (s1; s2)) , message m 2 f0; 1g∗ distribution.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us