SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure en...
Gespeichert in:
Veröffentlicht in: | Journal of cryptographic engineering 2024-04, Vol.14 (1), p.35-41 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 41 |
---|---|
container_issue | 1 |
container_start_page | 35 |
container_title | Journal of cryptographic engineering |
container_volume | 14 |
creator | Ribeiro, Leonardo A. D. S. da Silva Lima, José Paulo de Queiroz, Ruy J. G. B. Chagas, Amirton B. Junior, José R. R. Quintino, Jonysberg P. da Silva, Fabio Q. B. Santos, André L. M. |
description | SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code. |
doi_str_mv | 10.1007/s13389-023-00337-x |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3048742238</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3048742238</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpD7CyxAYWBj_iR9iVqjwEFVKBteU6ThtonNROUPv3pATBjtWMNOfekQ4ApwRfEozlVSSMqRRhyhDGjEm0PQADSlKMFCfi8HfH6hiMYiwWHZRgziUbgOJlfDOdw7qKDdq0xjdtCT_cDjpvTR3btWmKysPS2ZXxRSzh-eN0dnEN3adZt93NL2HtQl6F0njrYOHheD6DxmdwKxJogl0VjbNNG1w8AUe5WUc3-plD8HY7fZ3co6fnu4fJ-AlZKnGDrOB44ZLMZlQqLqRSi8ykqVSpITizkricSmIMT1PLcMaFy3FChBC0C_JMsSE463vrUG1aFxv9XrXBdy81w4mSCaVsT9GesqGKMbhc16EoTdhpgvXequ6t6s6q_raqt12I9aHYwX7pwl_1P6kvkYN59Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3048742238</pqid></control><display><type>article</type><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><source>SpringerLink Journals - AutoHoldings</source><creator>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</creator><creatorcontrib>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</creatorcontrib><description>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</description><identifier>ISSN: 2190-8508</identifier><identifier>EISSN: 2190-8516</identifier><identifier>DOI: 10.1007/s13389-023-00337-x</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Circuits and Systems ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Cryptology ; Data Structures and Information Theory ; Encryption ; Networks ; Operating Systems ; Performance evaluation ; Quantum cryptography ; Regular Paper</subject><ispartof>Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.35-41</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</cites><orcidid>0000-0003-0822-9208</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13389-023-00337-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13389-023-00337-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Ribeiro, Leonardo A. D. S.</creatorcontrib><creatorcontrib>da Silva Lima, José Paulo</creatorcontrib><creatorcontrib>de Queiroz, Ruy J. G. B.</creatorcontrib><creatorcontrib>Chagas, Amirton B.</creatorcontrib><creatorcontrib>Junior, José R. R.</creatorcontrib><creatorcontrib>Quintino, Jonysberg P.</creatorcontrib><creatorcontrib>da Silva, Fabio Q. B.</creatorcontrib><creatorcontrib>Santos, André L. M.</creatorcontrib><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><title>Journal of cryptographic engineering</title><addtitle>J Cryptogr Eng</addtitle><description>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</description><subject>Algorithms</subject><subject>Circuits and Systems</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Networks</subject><subject>Operating Systems</subject><subject>Performance evaluation</subject><subject>Quantum cryptography</subject><subject>Regular Paper</subject><issn>2190-8508</issn><issn>2190-8516</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kMtOwzAQRS0EElXpD7CyxAYWBj_iR9iVqjwEFVKBteU6ThtonNROUPv3pATBjtWMNOfekQ4ApwRfEozlVSSMqRRhyhDGjEm0PQADSlKMFCfi8HfH6hiMYiwWHZRgziUbgOJlfDOdw7qKDdq0xjdtCT_cDjpvTR3btWmKysPS2ZXxRSzh-eN0dnEN3adZt93NL2HtQl6F0njrYOHheD6DxmdwKxJogl0VjbNNG1w8AUe5WUc3-plD8HY7fZ3co6fnu4fJ-AlZKnGDrOB44ZLMZlQqLqRSi8ykqVSpITizkricSmIMT1PLcMaFy3FChBC0C_JMsSE463vrUG1aFxv9XrXBdy81w4mSCaVsT9GesqGKMbhc16EoTdhpgvXequ6t6s6q_raqt12I9aHYwX7pwl_1P6kvkYN59Q</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Ribeiro, Leonardo A. D. S.</creator><creator>da Silva Lima, José Paulo</creator><creator>de Queiroz, Ruy J. G. B.</creator><creator>Chagas, Amirton B.</creator><creator>Junior, José R. R.</creator><creator>Quintino, Jonysberg P.</creator><creator>da Silva, Fabio Q. B.</creator><creator>Santos, André L. M.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-0822-9208</orcidid></search><sort><creationdate>20240401</creationdate><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><author>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Circuits and Systems</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Networks</topic><topic>Operating Systems</topic><topic>Performance evaluation</topic><topic>Quantum cryptography</topic><topic>Regular Paper</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ribeiro, Leonardo A. D. S.</creatorcontrib><creatorcontrib>da Silva Lima, José Paulo</creatorcontrib><creatorcontrib>de Queiroz, Ruy J. G. B.</creatorcontrib><creatorcontrib>Chagas, Amirton B.</creatorcontrib><creatorcontrib>Junior, José R. R.</creatorcontrib><creatorcontrib>Quintino, Jonysberg P.</creatorcontrib><creatorcontrib>da Silva, Fabio Q. B.</creatorcontrib><creatorcontrib>Santos, André L. M.</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptographic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ribeiro, Leonardo A. D. S.</au><au>da Silva Lima, José Paulo</au><au>de Queiroz, Ruy J. G. B.</au><au>Chagas, Amirton B.</au><au>Junior, José R. R.</au><au>Quintino, Jonysberg P.</au><au>da Silva, Fabio Q. B.</au><au>Santos, André L. M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</atitle><jtitle>Journal of cryptographic engineering</jtitle><stitle>J Cryptogr Eng</stitle><date>2024-04-01</date><risdate>2024</risdate><volume>14</volume><issue>1</issue><spage>35</spage><epage>41</epage><pages>35-41</pages><issn>2190-8508</issn><eissn>2190-8516</eissn><abstract>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13389-023-00337-x</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0003-0822-9208</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2190-8508 |
ispartof | Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.35-41 |
issn | 2190-8508 2190-8516 |
language | eng |
recordid | cdi_proquest_journals_3048742238 |
source | SpringerLink Journals - AutoHoldings |
subjects | Algorithms Circuits and Systems Communications Engineering Computer Communication Networks Computer Science Cryptology Data Structures and Information Theory Encryption Networks Operating Systems Performance evaluation Quantum cryptography Regular Paper |
title | SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T23%3A05%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SABER%20post-quantum%20key%20encapsulation%20mechanism%20(KEM):%20evaluating%20performance%20in%20ARM%20and%20x64%20architectures&rft.jtitle=Journal%20of%20cryptographic%20engineering&rft.au=Ribeiro,%20Leonardo%20A.%20D.%20S.&rft.date=2024-04-01&rft.volume=14&rft.issue=1&rft.spage=35&rft.epage=41&rft.pages=35-41&rft.issn=2190-8508&rft.eissn=2190-8516&rft_id=info:doi/10.1007/s13389-023-00337-x&rft_dat=%3Cproquest_cross%3E3048742238%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3048742238&rft_id=info:pmid/&rfr_iscdi=true |