A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC

Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano

2024

Abstract

Secure Key Encapsulation Mechanisms (KEMs) are necessary for providing authentication and confidentiality through symmetrical encryption. The emergence of quantum computers is a threat to current KEM standards, therefore new quantum-resistant algorithms have been developed in recent years. One of these propositions is the code-based Hamming Quasi-Cyclic (HQC) algorithm. However, a lightweight version of this algorithm is required to run on low-performance systems such as Internet of Things (IoT) devices or small Unmanned Aerial Vehicles (UAVs). This article presents an algorithmic optimization of the HQC algorithm applied on constrained hardware. The goal is to improve the performance for real-life applications, and thus the test bed uses a Real-Time Operating System (RTOS) to emulate a system able to complete complex tasks. This optimization reduces the completion time of key generation, encapsulation, and decapsulation by a factor of 10, and reduces significantly the Random Access Memory (RAM) usage for the algorithm. These improvements make HQC viable for real-life applications on constrained hardware, and the performance could be further improved by using hardware-specific optimizations.

Download


Paper Citation


in Harvard Style

Aissaoui R., Deneuville J., Guerber C. and Pirovano A. (2024). A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. In Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-709-2, SciTePress, pages 668-673. DOI: 10.5220/0012757800003767


in Bibtex Style

@conference{secrypt24,
author={Ridwane Aissaoui and Jean-Christophe Deneuville and Christophe Guerber and Alain Pirovano},
title={A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2024},
pages={668-673},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012757800003767},
isbn={978-989-758-709-2},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC
SN - 978-989-758-709-2
AU - Aissaoui R.
AU - Deneuville J.
AU - Guerber C.
AU - Pirovano A.
PY - 2024
SP - 668
EP - 673
DO - 10.5220/0012757800003767
PB - SciTePress