SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures

SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure en...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of cryptographic engineering 2024-04, Vol.14 (1), p.35-41
Hauptverfasser: Ribeiro, Leonardo A. D. S., da Silva Lima, José Paulo, de Queiroz, Ruy J. G. B., Chagas, Amirton B., Junior, José R. R., Quintino, Jonysberg P., da Silva, Fabio Q. B., Santos, André L. M.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 41
container_issue 1
container_start_page 35
container_title Journal of cryptographic engineering
container_volume 14
creator Ribeiro, Leonardo A. D. S.
da Silva Lima, José Paulo
de Queiroz, Ruy J. G. B.
Chagas, Amirton B.
Junior, José R. R.
Quintino, Jonysberg P.
da Silva, Fabio Q. B.
Santos, André L. M.
description SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.
doi_str_mv 10.1007/s13389-023-00337-x
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3048742238</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3048742238</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</originalsourceid><addsrcrecordid>eNp9kMtOwzAQRS0EElXpD7CyxAYWBj_iR9iVqjwEFVKBteU6ThtonNROUPv3pATBjtWMNOfekQ4ApwRfEozlVSSMqRRhyhDGjEm0PQADSlKMFCfi8HfH6hiMYiwWHZRgziUbgOJlfDOdw7qKDdq0xjdtCT_cDjpvTR3btWmKysPS2ZXxRSzh-eN0dnEN3adZt93NL2HtQl6F0njrYOHheD6DxmdwKxJogl0VjbNNG1w8AUe5WUc3-plD8HY7fZ3co6fnu4fJ-AlZKnGDrOB44ZLMZlQqLqRSi8ykqVSpITizkricSmIMT1PLcMaFy3FChBC0C_JMsSE463vrUG1aFxv9XrXBdy81w4mSCaVsT9GesqGKMbhc16EoTdhpgvXequ6t6s6q_raqt12I9aHYwX7pwl_1P6kvkYN59Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3048742238</pqid></control><display><type>article</type><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><source>SpringerLink Journals - AutoHoldings</source><creator>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</creator><creatorcontrib>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</creatorcontrib><description>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</description><identifier>ISSN: 2190-8508</identifier><identifier>EISSN: 2190-8516</identifier><identifier>DOI: 10.1007/s13389-023-00337-x</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Circuits and Systems ; Communications Engineering ; Computer Communication Networks ; Computer Science ; Cryptology ; Data Structures and Information Theory ; Encryption ; Networks ; Operating Systems ; Performance evaluation ; Quantum cryptography ; Regular Paper</subject><ispartof>Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.35-41</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</cites><orcidid>0000-0003-0822-9208</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s13389-023-00337-x$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s13389-023-00337-x$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Ribeiro, Leonardo A. D. S.</creatorcontrib><creatorcontrib>da Silva Lima, José Paulo</creatorcontrib><creatorcontrib>de Queiroz, Ruy J. G. B.</creatorcontrib><creatorcontrib>Chagas, Amirton B.</creatorcontrib><creatorcontrib>Junior, José R. R.</creatorcontrib><creatorcontrib>Quintino, Jonysberg P.</creatorcontrib><creatorcontrib>da Silva, Fabio Q. B.</creatorcontrib><creatorcontrib>Santos, André L. M.</creatorcontrib><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><title>Journal of cryptographic engineering</title><addtitle>J Cryptogr Eng</addtitle><description>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</description><subject>Algorithms</subject><subject>Circuits and Systems</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptology</subject><subject>Data Structures and Information Theory</subject><subject>Encryption</subject><subject>Networks</subject><subject>Operating Systems</subject><subject>Performance evaluation</subject><subject>Quantum cryptography</subject><subject>Regular Paper</subject><issn>2190-8508</issn><issn>2190-8516</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kMtOwzAQRS0EElXpD7CyxAYWBj_iR9iVqjwEFVKBteU6ThtonNROUPv3pATBjtWMNOfekQ4ApwRfEozlVSSMqRRhyhDGjEm0PQADSlKMFCfi8HfH6hiMYiwWHZRgziUbgOJlfDOdw7qKDdq0xjdtCT_cDjpvTR3btWmKysPS2ZXxRSzh-eN0dnEN3adZt93NL2HtQl6F0njrYOHheD6DxmdwKxJogl0VjbNNG1w8AUe5WUc3-plD8HY7fZ3co6fnu4fJ-AlZKnGDrOB44ZLMZlQqLqRSi8ykqVSpITizkricSmIMT1PLcMaFy3FChBC0C_JMsSE463vrUG1aFxv9XrXBdy81w4mSCaVsT9GesqGKMbhc16EoTdhpgvXequ6t6s6q_raqt12I9aHYwX7pwl_1P6kvkYN59Q</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Ribeiro, Leonardo A. D. S.</creator><creator>da Silva Lima, José Paulo</creator><creator>de Queiroz, Ruy J. G. B.</creator><creator>Chagas, Amirton B.</creator><creator>Junior, José R. R.</creator><creator>Quintino, Jonysberg P.</creator><creator>da Silva, Fabio Q. B.</creator><creator>Santos, André L. M.</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-0822-9208</orcidid></search><sort><creationdate>20240401</creationdate><title>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</title><author>Ribeiro, Leonardo A. D. S. ; da Silva Lima, José Paulo ; de Queiroz, Ruy J. G. B. ; Chagas, Amirton B. ; Junior, José R. R. ; Quintino, Jonysberg P. ; da Silva, Fabio Q. B. ; Santos, André L. M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-c650be4dcd27856788bda99789a10dc71ef271aa599c30d56ef04166626505d83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Circuits and Systems</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptology</topic><topic>Data Structures and Information Theory</topic><topic>Encryption</topic><topic>Networks</topic><topic>Operating Systems</topic><topic>Performance evaluation</topic><topic>Quantum cryptography</topic><topic>Regular Paper</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ribeiro, Leonardo A. D. S.</creatorcontrib><creatorcontrib>da Silva Lima, José Paulo</creatorcontrib><creatorcontrib>de Queiroz, Ruy J. G. B.</creatorcontrib><creatorcontrib>Chagas, Amirton B.</creatorcontrib><creatorcontrib>Junior, José R. R.</creatorcontrib><creatorcontrib>Quintino, Jonysberg P.</creatorcontrib><creatorcontrib>da Silva, Fabio Q. B.</creatorcontrib><creatorcontrib>Santos, André L. M.</creatorcontrib><collection>CrossRef</collection><jtitle>Journal of cryptographic engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ribeiro, Leonardo A. D. S.</au><au>da Silva Lima, José Paulo</au><au>de Queiroz, Ruy J. G. B.</au><au>Chagas, Amirton B.</au><au>Junior, José R. R.</au><au>Quintino, Jonysberg P.</au><au>da Silva, Fabio Q. B.</au><au>Santos, André L. M.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures</atitle><jtitle>Journal of cryptographic engineering</jtitle><stitle>J Cryptogr Eng</stitle><date>2024-04-01</date><risdate>2024</risdate><volume>14</volume><issue>1</issue><spage>35</spage><epage>41</epage><pages>35-41</pages><issn>2190-8508</issn><eissn>2190-8516</eissn><abstract>SABER is one of the four finalists in the third round of the ongoing NIST post-quantum cryptography standardization process. It is one of the three finalists that are based on lattice problems. This article intends to show the results of an analysis of SABER as reported by DÁnvers (in: CPA-secure encryption and CCA-secure KEM, eprint.iacr.org, 2020) performance in x64 and ARM architectures. SABER was tested following a scenario where, first, a pair of public and private keys were generated. Then, data representing a session key was encrypted using the generated public key and decrypted using the generated private key. Algorithm performance was evaluated by running these steps in each architecture proposed. Based on the data collected, it was checked if SABER is suitable or not for mobile devices. Bottlenecks were found while executing SABER code.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s13389-023-00337-x</doi><tpages>7</tpages><orcidid>https://orcid.org/0000-0003-0822-9208</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2190-8508
ispartof Journal of cryptographic engineering, 2024-04, Vol.14 (1), p.35-41
issn 2190-8508
2190-8516
language eng
recordid cdi_proquest_journals_3048742238
source SpringerLink Journals - AutoHoldings
subjects Algorithms
Circuits and Systems
Communications Engineering
Computer Communication Networks
Computer Science
Cryptology
Data Structures and Information Theory
Encryption
Networks
Operating Systems
Performance evaluation
Quantum cryptography
Regular Paper
title SABER post-quantum key encapsulation mechanism (KEM): evaluating performance in ARM and x64 architectures
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T23%3A05%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=SABER%20post-quantum%20key%20encapsulation%20mechanism%20(KEM):%20evaluating%20performance%20in%20ARM%20and%20x64%20architectures&rft.jtitle=Journal%20of%20cryptographic%20engineering&rft.au=Ribeiro,%20Leonardo%20A.%20D.%20S.&rft.date=2024-04-01&rft.volume=14&rft.issue=1&rft.spage=35&rft.epage=41&rft.pages=35-41&rft.issn=2190-8508&rft.eissn=2190-8516&rft_id=info:doi/10.1007/s13389-023-00337-x&rft_dat=%3Cproquest_cross%3E3048742238%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3048742238&rft_id=info:pmid/&rfr_iscdi=true