Sign In to Follow Application
View All Documents & Correspondence

Side Channel Robust Incomplete Number Theoretic Transform For Crystal Kyber

Abstract: An apparatus comprises an input register comprising an input polynomial, a processing datapath communicatively coupled to the input register comprising a plurality of compute nodes to perform an incomplete number theoretic transform (NTT) algorithm on the input polynomial to generate an output polynomial in NTT format, the plurality of compute nodes comprising at least a first NTT circuit comprising a single butterfly circuit to perform a series of butterfly calculations on input data; and a randomizing circuitry to randomize an order of the series of butterfly calculations.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
16 August 2022
Publication Number
12/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

INTEL CORPORATION
2200 Mission College Boulevard, Santa Clara, California 95054, USA

Inventors

1. SANTOSH GHOSH
7638 NE Prefontaine St, Hillsboro, Oregon, 97124, USA
2. ANDREA BASSO
Flat 3, Holme House, Sulgrave Road, London, W6 7QQ, United Kingdom.
3. DUMITRU-DANIEL DINU
100 N Hearthstone Way Apt 3117, Chandler, Arizona 85226, USA
4. AVINASH L. VARNA
400 N Coronado St, Apt 1056., Chandler, Arizona 85224, USA
5. MANOJ SASTRY
4006 NW Riggs Drive, Portland, Oregon, 97229, USA

Specification

Description:RELATED APPLICATION
[0001] The present application claims priority to U.S. Non-Provisional Patent Application No. 17/480,413 filed on 21 September 2021 and titled “SIDE-CHANNEL ROBUST INCOMPLETE NUMBER THEORETIC TRANSFORM FOR CRYSTAL KYBER” the entire disclosure of which is hereby incorporated by reference.

BACKGROUND
[0002] Subject matter described herein relates generally to the field of computer security and more particularly to post-quantum cryptography.
[0003] Crystal-Kyber is a digital key encapsulation mechanism (KEM) based on the difficulty of lattice problems over module lattices that is secure under chosen message attacks. Crystal-Kyber relies in part on a polynomial multiplication using a secret polynomial, which raises the potential for side channel attacks to obtain secret information used in the signature scheme. Accordingly, techniques to protect Crystal-Kyber operations from side channel snooping attacks may find utility, e.g., in computer-based communication systems and methods.

BRIEF DESCRIPTION OF THE DRAWINGS
[0004] The detailed description is described with reference to the accompanying figures.
[0005] Fig. 1 is a schematic illustration of a signing device and a verifying device, in accordance with embodiments.
[0006] Fig. 2 is a schematic illustration of an incomplete number theoretic transform (NTT), in accordance with embodiments.
[0007] Fig. 3 is a schematic illustration of paired coefficient-wise multiplication, in accordance with embodiments.
[0008] Fig. 4 is a schematic illustration of components to implement an incomplete number theoretic transform (NTT) calculation, in accordance with embodiments.
[0009] Fig. 5 is a schematic illustration of a processing structure to implement a number theoretic transform (NTT), in accordance with embodiments
[0010] Fig. 6 is a schematic illustration of a computing architecture which may be adapted to implement hardware acceleration in accordance with some examples.

DETAILED DESCRIPTION
[0011] Described herein are exemplary systems and methods to implement low overheard side channel protection for number theoretic transform (NTT) operations. In the following description, numerous specific details are set forth to provide a thorough understanding of various examples. However, it will be understood by those skilled in the art that the various examples may be practiced without the specific details. In other instances, well-known methods, procedures, components, and circuits have not been illustrated or described in detail so as not to obscure the examples.
, C , Claims:1. An apparatus, comprising:
an input register comprising an input polynomial;
a processing datapath communicatively coupled to the input register comprising a plurality of compute nodes to perform an incomplete number theoretic transform (NTT) algorithm on the input polynomial to generate an output polynomial in NTT format, the plurality of compute nodes comprising:
at least a first NTT circuit comprising a single butterfly circuit to perform a series of butterfly calculations on input data; and
a randomizing circuitry to randomize an order of the series of butterfly calculations.

Documents

Application Documents

# Name Date
1 202244046494-US 17480413-DASCODE-2300 [16-08-2022].pdf 2022-08-16
2 202244046494-FORM 1 [16-08-2022(online)].pdf 2022-08-16
3 202244046494-DRAWINGS [16-08-2022(online)].pdf 2022-08-16
4 202244046494-DECLARATION OF INVENTORSHIP (FORM 5) [16-08-2022(online)].pdf 2022-08-16
5 202244046494-COMPLETE SPECIFICATION [16-08-2022(online)].pdf 2022-08-16
6 202244046494-FORM 3 [13-02-2023(online)].pdf 2023-02-13
7 202244046494-FORM-26 [23-03-2023(online)].pdf 2023-03-23
8 202244046494-FORM 3 [14-08-2023(online)].pdf 2023-08-14
9 202244046494-Proof of Right [09-10-2023(online)].pdf 2023-10-09
10 202244046494-FORM 3 [15-02-2024(online)].pdf 2024-02-15
11 202244046494-FORM 18 [15-09-2025(online)].pdf 2025-09-15