Parameters of Classic McEliece Cryptography
Post-Quantum cryptography is at the forefront of technological advancements, with the Classic McEliece cryptosystem being a notable player in this field. The presentation discusses the adaptation of Classic McEliece parameters for efficient memory usage, presented at the Institute of Cybersecurity in Occitanie on April 3, 2024 by Cyrius NUGIER. The slides cover aspects such as key sizes, encryption, decryption, and comparisons with other post-quantum cryptography schemes like Kyber, HQC, NTRU, and more.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Paramtres de Classic McEliece adapt s au calcul en m moire Demi-Journ e Cryptographie Post-Quantique Institut Cybers curit Occitanie 3 Avril 2024 Cyrius NUGIER
= + 1
= + 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
SK size PK size CT size Keygen Encrypt Decrypt Kyber SK size PK size CT size Keygen Encrypt = + Decrypt HQC SK size PK size CT size Keygen Encrypt Decrypt SK size NTRU PK size CT size Keygen Encrypt Decrypt McEliece 1
Central Processing Control Unit Unit Arithmetic Logical Unit Registers L1 Cache L2 / L3 Main Memory 2
Central Processing Control Unit Unit Arithmetic Logical Unit Registers SIMD Registers SIMD Extension L1 Cache L2 / L3 Main Memory 2
Bit-line ... Word-line ... ... ... L1 ... ... Cache L2 / L3 ... Column Peripheral And, Or, Xor, Not Nand, 3
L1 Cache 16Ko 32 Ways 4096 bits 64 Bytes 8 Banks 4
Central Processing Control Unit Unit Arithmetic Logical Unit Registers SK PK SIMD Registers SIMD Extension L1 Cache L2 / L3 Main Memory 5
Central Processing Control Unit Unit Arithmetic Logical Unit Registers SK SIMD Registers SIMD Extension PK L1 Cache L2 / L3 Main Memory 5
3488 columns 1010011010 01110010 1010110 010110 768 rows 6
3488 columns 10000 ... 10001010100 01000 11101111011 00100 00010011 00010 00001 768 rows 6
XOR AND 6
32-bit RISC-V with 16KB L1 PIM cache 32-bit RISC-V 844 M total cycles 66 M total cycles 7 Classic McEliece Public Key generation - Area proportional to number of cycles
L1 Cache, 4096-bit parallelism A B D C E 8
L1 Cache, 4096-bit parallelism A B D C E 8
L1 Cache, 4096-bit parallelism _ n - k = m x t A _n B D C E 8
L1 Cache, 4096-bit parallelism _ n - k = m x t B' B _n B'' 8
Classic McEliece Parameter Set 348864 460896 6688128 6960119 8192128 m 12 13 13 13 13 t 64 96 128 6688 119 6960 128 8192 n 3488 4608 m t n Category I III V V V 7 8 96 128 2400 4096 9
Classic McEliece BIKE HQC FHE ? Parameter Set 348864 460896 6688128 6960119 8192128 m 12 13 13 13 13 t 64 96 128 6688 119 6960 128 8192 n 3488 4608 m t n Category I III V V V 7 8 96 128 2400 4096 ? 9
= + 10
Paramtres de Classic McEliece adapt s au calcul en m moire Demi-Journ e Cryptographie Post-Quantique Institut Cybers curit Occitanie 3 Avril 2024 Cyrius NUGIER