Skip to main content

Hardware-Software Implementation of a McEliece Cryptosystem for Post-quantum Cryptography

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1130))

Included in the following conference series:

Abstract

This paper shows the implementation on FPGA of a McEliece cryptosystem, which ensures the security recommendations given by the European Telecommunications Standards Institute (ETSI) for next generation of quantum-resistant cryptosystems. The proposed implementation provides more than 128 bits of quantum security using a public key of 2,097,152 bytes. The proposed system is based on a hardware/software implementation that uses an ARM Cortex-A53 core connected to a coprocessor through an AX14 lite interface. The complete system was implemented on a Xilinx Zynq UltraScale+ and it is able to decipher texts of 8192 bit-length is 47.39 ms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. McEliece, R.J.: A public key cryptosystem based on algebraic coding theory. DNS progress report 43.44 (1978)

    Google Scholar 

  2. Berlekamp, E.R., McEliece, R.J.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)

    Article  MathSciNet  Google Scholar 

  3. ETSI – European Telecommunications Standards Institute: Quantum Safe Cryptography (QSC); Quantum-safe algorithmic framework. ETSI GR QSC 001 v1.1.1 (2016)

    Google Scholar 

  4. National Institute of Standards and Technology: Report on Post-Quantum Cryptography. Internal report 8105 (2016). http://dx.doi.org/10.6028/NIST.IR.8105

  5. Augot, D., et al.: Initial recommendations of long-term secure post-quantum systems. Horizon 2020 ICT-645622. Revision 1 (2015)

    Google Scholar 

  6. Berson, T.: Failure of the McEliece public-key cryptosystem under message-resend and related-message attack, pp. 213–220. Springer, Heidelberg (1997)

    Google Scholar 

  7. Engelbert, D., Overbeck, R., Schmidt, A.: A summary of McEliece-type cryptosystems and their security. http://eprint.iacr.org/2006/162.ps

  8. Bernstein, D.J., Lange, T., Peters, C.: Attacking and defending the McEliece cryptosystem. In: International Sorkshop on Post-Quantum Cryptography, pp 31–46 (2008)

    Google Scholar 

  9. Eisenbarth, T., Güneysu, T., Heyse, S., Paar, C.: MicroEliece: McEliece for embedded devices. In: International Conference on Cryptographic Hardware and Embedded Systems - CHES (2009)

    Google Scholar 

  10. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer, Heidelberg (2009)

    Google Scholar 

  11. Von Maurich, I., Güneysu, T.: Lightweight code-based cryptography: QC_MDPC McEliece encryption on reconfigurable devices. In: Design, Automation & Test in Europe Conference & Exhibition (DATE) (2014)

    Google Scholar 

  12. Ghosh, S., Delvaux, J., Uhsadel, L., Verbauwhede, I.: A speed area optimized embedded co-procesor for McEliece cryptosistem. In: IEEE 23rd International Conference on Application-Specific Systems, Architectures and Processors (2012)

    Google Scholar 

  13. Heyse, S.: Code-based cryptography: implementing the McElice scheme on reconfigurable hardware. Master thesis, Faculty of Electrical Engineering and Information Technology, Ruhr-University Bochum (2009)

    Google Scholar 

  14. Flexiprovider. http://www.flexiprovider.de/

  15. Quantum-resistant cryptography. Oriol Farràs. Technical report (2017)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the Ministerio de Economía y Competitividad in the framework of the Programa Estatal de Investigación, Desarrollo e Innovación Orientada a los Retos de la Sociedad, project TEC2015-68784-R.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariano López-García .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

López-García, M., Cantó-Navarro, E. (2020). Hardware-Software Implementation of a McEliece Cryptosystem for Post-quantum Cryptography. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication. FICC 2020. Advances in Intelligent Systems and Computing, vol 1130. Springer, Cham. https://doi.org/10.1007/978-3-030-39442-4_60

Download citation

Publish with us

Policies and ethics