节点文献

后量子密码算法与芯片设计研究进展

The development of post-quantum cryptography algorithm and chip design

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 刘冬生李奥博胡昂陆家昊黄天泽杨朔李翔张嘉明

【Author】 LIU Dongsheng;LI Aobo;HU Ang;LU Jiahao;HUANG Tianze;YANG Shuo;LI Xiang;ZHAGN Jiaming;School of Integrated Circuits, Huazhong University of Science and Technology;

【机构】 华中科技大学集成电路学院

【摘要】 后量子密码是用于抵御量子计算机攻击的新一代密码技术,被视为传统密码系统的可靠替代,国际上相关标准也正在逐步形成。综述了后量子密码的发展历程,分析了当前算法研究的最新进展、数学原理及属性特点。从算法、硬件实现架构及具体电路实现3个层次展开分析,提出了未来研究所需要攻克的高效硬件实现、动态可重构、侧信道攻击防御及安全SoC集成等关键技术。通过对低功耗后量子密码芯片、高性能后量子密码芯片及芯片中的哈希散列、随机采样、运算加速和逻辑处理等核心模块进行了综述,总结了当前芯片实现在核心算子高效IP设计、多场景应用兼容、多元防御机制和信息基础设施融合等重点领域的应用现状与研究价值,以及产业化与多元化方面的未来发展趋势。

【Abstract】 Post-quantum cryptography is a new generation of cryptography technology for defending quantum computer attacks.It is regarded as a reliable alternative to traditional cryptography systems, and relevant international standards are gradually emerging. This paper briefly describes the development of post-quantum cryptography, and analyzes the latest development,mathematical principles and characteristics of current algorithm research. On this basis, the analysis is carried out from the three levels of algorithm, hardware architecture, and specific circuit implementation. Then we indicate key technologies that future research needs to overcome, such as efficient hardware implementation, dynamic reconfigurability, side channel attack defense,and secure SoC integration. Moreover, the low-power post-quantum cryptographic chip, the high-performance post-quantum cryptographic chip and core modules such as hashing, random sampling, operation acceleration and logic processing in the chip are described in detail. Finally, we summarize the application status and research value of the current chip implementation in terms of efficient IP design for core circuits, multi-scenario application compatibility, multiple defense mechanisms, and information infrastructure integration, and cover the future development trend of industrialization and diversification. By studying the post-quantum cryptography algorithm and its key technologies, then exploring efficient chip design and implementation methods, it is conducive to promoting the research on the theory and application of public key cryptosystems against quantum attacks, and provides guarantee for China’s information security strategy in the quantum era.

  • 【文献出处】 科技导报 ,Science & Technology Review , 编辑部邮箱 ,2024年02期
  • 【分类号】TN918.4;O413
  • 【下载频次】51
节点文献中: 

本文链接的文献网络图示:

本文的引文网络