Skip to main content

ARMing-Sword: Scabbard on ARM

  • Conference paper
  • First Online:
Information Security Applications (WISA 2022)

Abstract

Scabbard, one of the Post-quantum Key Encapsulation Mechanisms (KEM), is a improved version of Saber that Lattice-based Key Encapsulation Mechanism. Scabbard has three schemes, called Florete, Espada, and Sable. Florete is a Ring-LWR-based KEM that effectively reuses the hardware architecture module used in Saber. Espada is a Module-LWR-based KEM that can be parallelized, requires very little memory, and is advantageous for operating in a resource-constrained environment. Finally, Sable adjusted the parameters to reduce the standard deviation of errors occurring in the Saber. In this paper, we propose ARMing-sword that optimized implementation of Scabbard on ARM processor. For the efficient implementation, a parallel operation technique using vector registers and vector instructions of the ARM processor is used. We focused on optimizing the multiplier, which takes majority execution time for Scabbard computation, and propose a Direct Mapping and Sliding Window methods for accumulating computation results. ARMing-sword has a performance difference of up-to 6.34\(\times \) in the multiplier and a performance difference of up-to 2.17\(\times \) in the encryption algorithm to which the optimization technique is applied.

This work was partly supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2018-0-00264, Research on Blockchain Security Technology for IoT Services, 50%) and this work was partly supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIT) (No. NRF-2020R1F1A1048478, 50%) and this work was partly supported by Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government(MSIT) (No.2022-0-00627, Development of Lightweight BIoT technology for Highly Constrained Devices, 25%).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/josebmera/scabbard.

References

  1. Deutsch, D.: Quantum theory, the church-turing principle and the universal quantum computer. Proc. R. Soc. Lond. A Math. Phys. Sci. 400(1818), 97–117 (1985)

    MathSciNet  MATH  Google Scholar 

  2. Leuenberger, M.N., Loss, D.: Quantum computing in molecular magnets. Nature 410(6830), 789–793 (2001)

    Article  Google Scholar 

  3. Boualem, A., De Runz, C., Ayaida, M.: Partial paving strategy: application to optimize the area coverage problem in mobile wireless sensor networks. J. Wireless Mobile Netw. Ubiquitous Comput. Dependable Appl. 13(2), 1–22 (2022)

    Google Scholar 

  4. Kirsch, Z., Chow, M.: Quantum computing: the risk to existing encryption methods (2015). https://wwwcs.tufts.edu/comp/116/archive/fall2015/zkir sch. pdf

  5. Moody, D., et al.: Status report on the second round of the NIST post-quantum cryptography standardization process (2020)

    Google Scholar 

  6. Bernstein, D.J., et al.: Classic McEliece: conservative code-based cryptography (2017)

    Google Scholar 

  7. Avanzi, R., et al.: CRYSTALS-Kyber algorithm specifications and supporting documentation. NIST PQC Round 2(4), 1–43 (2019)

    Google Scholar 

  8. Chen, C., et al.: NTRU algorithm specifications and supporting documentation. In: Second PQC Standardization Conference (2019)

    Google Scholar 

  9. D’Anvers, J.-P., Karmakar, A., Sinha Roy, S., Vercauteren, F.: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In: Joux, A., Nitaj, A., Rachidi, T. (eds.) AFRICACRYPT 2018. LNCS, vol. 10831, pp. 282–305. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-89339-6_16

    Chapter  Google Scholar 

  10. Auten, D., Gamage, T.: Impact of resource-constrained networks on the performance of NIST round-3 PQC candidates. In: 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 768–773. IEEE (2021)

    Google Scholar 

  11. Mera, J.M.B., Karmakar, A., Kundu, S., Verbauwhede, I.: Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms. IACR Trans. Cryptographic Hardware Embed. Syst. 2021, 474–509 (2021)

    Article  Google Scholar 

  12. Knuth, D.E.: Art of Computer Programming, Volume 2: Seminumerical Algorithms. Addison-Wesley Professional, Boston (2014)

    Google Scholar 

  13. Kwon, H., et al.: ARMed Frodo. In: Kim, H. (ed.) WISA 2021. LNCS, vol. 13009, pp. 206–217. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-89432-0_17

    Chapter  Google Scholar 

  14. Song, J., Kim, Y., Seo, S.: Optimization study of Toom-Cook algorithm in NIST PQC SABER utilizing ARM/NEON processor. J. Korea Inst. Inf. Secur. Cryptol. 31(3), 463–471 (2021)

    Google Scholar 

  15. Kim, Y., Song, J., Seo, S.C.: Accelerating falcon on ARMv8. IEEE Access (2022)

    Google Scholar 

  16. Kwon, H., Kim, H., Sim, M., Lee, W.-K., Seo, H.: Look-up the rainbow: efficient table-based parallel implementation of rainbow signature on 64-bit ARMv8 processors. Cryptology ePrint Archive (2021)

    Google Scholar 

  17. You, G., Kim, G., Cho, S.-J., Han, H.: A comparative study on optimization, obfuscation, and deobfuscation tools in android. J. Internet Serv. Inf. Secur. 11(1), 2–15 (2021)

    Google Scholar 

  18. ARMv8-A instruction set architecture. https://documentation-service.arm.com/static/613a2c38674a052ae36ca307. Accessed 26 June 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hwajeong Seo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kwon, H. et al. (2023). ARMing-Sword: Scabbard on ARM. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25659-2_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25658-5

  • Online ISBN: 978-3-031-25659-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics