Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors

Author:

Kwon Hyeokdong1ORCID,Kim Hyunjun1ORCID,Sim Minjoo1ORCID,Lee Wai-Kong2ORCID,Seo Hwajeong1ORCID

Affiliation:

1. Hansung University, Republic of Korea

2. Gachon University, Republic of Korea

Abstract

The Rainbow Signature Scheme is one of the finalists in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition, but failed to win because it has lack of stability in the parameter selection. It is the only signature candidate based on a multivariate quadratic equation. Rainbow signatures have smaller signature sizes compared with other post-quantum cryptography candidates. However, they require expensive tower-field based polynomial multiplications. In this article, we propose an efficient implementation of Rainbow signatures using a look-up table–based multiplication method. The polynomial multiplications in Rainbow signatures are performed on the 𝔽 16 field, which is divided into sub-fields 𝔽 4 and 𝔽 2 under the tower-field method. To accelerate the multiplication process on target processors, we propose a look-up table–based tower-field multiplication technique. In 𝔽 16 , all values are expressed in 4-bit data format and can be implemented using a 256-byte look-up table access. The implementation uses the TBL and TBX instructions of the 64-bit ARMv8 target processor. For Rainbow III and Rainbow V, they are computed on the 𝔽 256 field using an additional 16-byte table instead of creating a new look-up table. The proposed technique uses the vector registers of 64-bit ARMv8 processors and can calculate 16 result values with a single instruction. We also proposed implementations that are resistant to timing attacks. There are two types of implementations. The first one is the cache side-attack resistant implementation, which utilizes the 128-byte cache lines of the M1 processor. In this implementation, cache misses do not occur, and cache hits always occur. The second type is the constant-time implementation. This method takes a step-by-step approach to finding the required look-up table value and ensures that the same number of accesses is made regardless of which look-up table value is called. This implementation is designed to be constant-time, meaning it does not leak timing information. Our experiments on modern Apple M1 processors showed up to 428.73× and 114.16× better performance for finite field multiplications and Rainbow signatures schemes, respectively, compared with previous reference implementations. To the best of our knowledge, this proposed Rainbow implementation is the first optimized Rainbow implementation for 64-bit ARMv8 processors.

Funder

Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government

Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korean government

Publisher

Association for Computing Machinery (ACM)

Subject

Hardware and Architecture,Software

Reference22 articles.

1. Daniel J. Bernstein and Tung Chou. 2014. Faster binary-field multiplication and faster binary-field MACS. In International Conference on Selected Areas in Cryptography. Springer, 92–111.

2. Breaking rainbow takes a weekend on a laptop;Beullens Ward;Cryptology ePrint Archive,2022

3. Quantum Resource Estimates of Grover’s Key Search on ARIA

4. Implementing 128-bit secure MPKC signatures;Chen Ming-Shing;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,2018

5. Rainbow on Cortex-M4.;Chou Tung;IACR Cryptol. ePrint Arch.,2021

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3