Optimizing Dilithium Implementation with AVX2/-512

Author:

Xu Runqing1ORCID,He Debiao1ORCID,Luo Min1ORCID,Peng Cong1ORCID,Zeng Xiangyong1ORCID

Affiliation:

1. Wuhan University, Wuhan, China

Abstract

Dilithium is a signature scheme that is currently being standardized to the Module-Lattice-Based Digital Signature Standard by NIST. It is believed to be secure even against attacks from large-scale quantum computers based on lattice problems. The implementation efficiency is important for promoting the migration of current cryptography algorithms to post-quantum cryptography algorithms. In this article, we optimize the implementation of Dilithium with several new approaches proposed. Firstly, we improve the efficiency of parallel NTT implementations. The overhead of shuffling operations is reduced in our implementations, and fewer loading instructions are invoked for the precomputations. Then, we optimize the sampling and bit-packing of polynomial coefficients in Dilithium. We can handle double the number of coefficients within one register using a new approach for the sampling of secret key polynomials. The approaches proposed in this article are applicable to implementations under AVX2 and AVX-512 instruction sets. Take Dilithium2 as an illustration, our AVX2 implementation demonstrates improvements of 22.7%, 16.9%, and 13.5% for KeyGen, Sign, and Verify compared with the previous implementation.

Funder

National Key Research and Development Program of China

National Natural Science Foundation of China

New 20 Project of Higher Education of Jinan

Innovation Group Project of the Natural Science Foundation of Hubei Province

Fundamental Research Funds for the Central Universities

Publisher

Association for Computing Machinery (ACM)

Reference38 articles.

1. Fast and Clean: Auditable high-performance assembly via constraint solving

2. Faster Kyber and Dilithium on the Cortex-M4

3. Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. 2016. Post-quantum key exchange - a new hope. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 327–343. Retrieved from https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/alkim

4. Dor Mariel Alter Peter Schwabe and Joan Daemen. 2021. Optimizing the NIST post quantum candidate SPHINCS+ using AVX-512.

5. Protecting Dilithium against Leakage

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3