Processor for realizing post quantum cryptography Saber algorithm

A quantum cryptography and processor technology, which is applied in the field of processors implementing the post-quantum cryptography Saber algorithm, to achieve the effect of taking into account high efficiency, efficient resources, and reducing resource consumption

Pending Publication Date: 2022-03-08
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the post-quantum cryptography Saber algorithm is implemented in hardware,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processor for realizing post quantum cryptography Saber algorithm
  • Processor for realizing post quantum cryptography Saber algorithm
  • Processor for realizing post quantum cryptography Saber algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the technical problems, technical solutions and beneficial effects to be solved, in connection with the accompanying drawings and examples, the present invention will be described in detail below with reference to the accompanying drawings and examples. It will be appreciated that the specific embodiments described herein are intended to be construed as used herein.

[0024] In a subsequent description, there is only a specific meaning of the present invention using the suffix used to represent the components such as "modules", "component" or "unit". Therefore, "modules", "components" or "unit" can be used in combination.

[0025] The embodiment of the present invention provides a processor for implementing a post-quantum password SABER algorithm, which is for the prior art, and there is no problem with efficient and resource overhead when implementing the quantum password Saber algorithm in the manner of using pure hardware. By reasonable division of the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of information security, and discloses a processor for implementing a post quantum cryptography Saber algorithm, the processor is implemented by hardware and comprises a storage module for storing data and instructions, the processor uses a customized reduced instruction set, and the instructions stored in the storage module are instructions in an instruction set; the function module is used for executing operations related to the post quantum cryptography Saber algorithm, and the function module comprises the following sub-modules: a third generation secure hash algorithm SHA3 sub-module, a binary sampling sub-module, a polynomial multiplier, an encryption and decryption sub-module, a verification sub-module and a data bit width conversion sub-module; and the control module is used for controlling each sub-module in the functional module to execute corresponding operation according to the instruction stored in the storage module so as to realize at least one of key generation, key encapsulation and key de-encapsulation in the post quantum cryptography Saber algorithm. According to the embodiment of the invention, the resource overhead can be saved while high efficiency is realized.

Description

Technical field [0001] The present invention relates to the field of information security techniques, and more particularly to a processor for implementing a post-quantum password SABER algorithm. Background technique [0002] In the information security technology, in order to ensure the security of the information, the transmitting end needs to be encrypted before the information transmission is required. After receiving the information, the information is required to decrypt the information using the corresponding key. [0003] With the development of technology, password technology is developing from the traditional public key-based password technology to PQC (Post-Quantum Cryptography, the post-quantum password) technology direction. The so-called PQC technology refers to a password technology that can resist quantum computer attacks. Reference to "anti-quantum cryptography". The "post" refers to the existing public key cryptographic algorithm (such as RSA, Diffie-Hellman, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06N10/40G06N10/20G06N10/60G06F9/30
CPCG06N10/00G06F9/3001
Inventor 刘冬生李翔胡昂李奥博杨朔陆家昊
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products