Affiliation:
1. Max Planck Institute for Security and Privacy
Abstract
We survey various mathematical tools used in software works multiplying polynomials in
ℤ
q
[
x
]
⟨
x
n
−
α
x
−
β
⟩
.
In particular, we survey implementation works targeting polynomial multiplications in lattice-based cryptosystems Dilithium, Kyber, NTRU, NTRU Prime, and Saber with instruction set architectures/extensions Armv7-M, Armv7E-M, Armv8-A, and AVX2.
There are three emphases in this paper: (i) modular arithmetic, (ii) homomorphisms, and (iii) vectorization. For modular arithmetic, we survey Montgomery, Barrett, and Plantard multiplications. For homomorphisms, we survey (a) various homomorphisms such as Cooley–Tukey FFT, Good–Thomas FFT, Bruun's FFT, Rader's FFT, Karatsuba, and Toom–Cook; (b) various algebraic techniques for adjoining nice properties to the coefficient rings, including localization, Schönhage's FFT, Nussbaumer's FFT, and coefficient ring switching; and (c) various algebraic techniques related to the polynomial moduli, including twisting, composed multiplication, evaluation at
∞
, truncation, incomplete transformation, striding, and Toeplitz matrix-vector product. For vectorization, we survey the relations between homomorphisms and vector arithmetic.
We then go through several case studies: We compare the implementations of modular multiplications used in Dilithium and Kyber, explain how the matrix-to-vector structure was exploited in Saber, and review the design choices of transformations for NTRU and NTRU Prime with vectorization. Finally, we outline several interesting implementation projects.
Publisher
International Association for Cryptologic Research
Reference126 articles.
1. Post-Quantum Cryptography Standardization Project;the US National Institute of Standards NIST
2. CRYSTALS–Dilithium;Roberto Avanzi,2020
3. CRYSTALS–Kyber;Roberto Avanzi,2020
4. NTRU;Cong Chen,2020
5. NTRU Prime;Daniel J. Bernstein,2020