Estrategias de implementación de algoritmos criptográficos post-cuánticos
Loading...
Official URL
Full text at PDC
Publication date
2023
Advisors (or tutors)
Editors
Journal Title
Journal ISSN
Volume Title
Publisher
Citation
Abstract
En los últimos años se han producido avances en la computación cuántica para poder elaborar algoritmos criptográficos que sean capaces de soportar y resistir ataques de ordenadores cuánticos. Estos son más potentes que un ordenador normal, ya que podrían explotar las vulnerabilidades de los algoritmos utilizados hoy en día. Estos ordenadores supondrían una amenaza para los algoritmos de cifrado actuales, ya que la velocidad de procesado o computo de estos afecta significativamente a la seguridad que ofrecen, lo que permitiría romper aquellos algoritmos que hasta ahora creíamos que eran muy seguros. El sector de la criptografía post-cuántica está en un crecimiento constante y se espera que en los próximos 10 años estos algoritmos se usen para proteger la información importante del mundo. Como consecuencia, NIST lanzó una convocatoria para elegir varios algoritmos criptográficos que pudiesen ser estandarizados y que pudiesen ser usados en el futuro por las grandes organizaciones para protegersus datos. La selección de estos algoritmos es un proceso que dura mucho tiempo y que consta de distintas fases en las que estos algoritmos son sometidos a distintas pruebas por los expertos de criptografía. En este contexto, en este Trabajo de Fin de Grado, primero, realizamos un análisis de aquellos algoritmos de cifrado que hemos considerado más interesantes dentro de la convocatoria NIST de algoritmos de cifrado post-cuántico. Después, nos centramos en el estudio del algoritmo McEliece, analizando varias implementaciones de dicho algoritmo y realizando un estudio de rendimiento de ellas. Por último, hemos realizado la paralelización de una de las implementaciones del algoritmo para ejecutarlo sobre GPUs, consiguiendo de esta forma una mejora del rendimiento del código.
Over the last years, there have been advances in quantum computing to be able to develop cryptographic algorithms that are capable of withstanding and resisting attacks from quantum computers. These are more powerful than normal computers, since they could exploit vulnerabilities in algorithms used today. These computers would suppose a threat to current cryptographic algorithms, since their processing or computing speed significantly affects the security they offer. These would allow breaking those algorithms that until now we believed were very secure. The post-quantum cryptography sector is constantly growing and it is expected that these algorithms in 10 years will be used to protect the world's important information. Consequently, NIST launched a calling signal to choose several cryptographic algorithms that could be standardized and that could be used in the future by large organizations to protect their data. The selection of these algorithms is a time-consuming process that consists of different phases in which these algorithms are put down to different tests by cryptography experts. In this context, in this Final Degree Project, first, we carry out an analysis of those cryptographic algorithms that we have considered most interesting within the NIST signal call for post-quantum cryptographic algorithms. Afterwards, we focus on the study of the McEliece algorithm, analyzing several implementations of it and carrying out a performance study of them. Finally, we have parallelized one of the implementations of the algorithm to run it on GPUs, thus improving the performance of the code.
Over the last years, there have been advances in quantum computing to be able to develop cryptographic algorithms that are capable of withstanding and resisting attacks from quantum computers. These are more powerful than normal computers, since they could exploit vulnerabilities in algorithms used today. These computers would suppose a threat to current cryptographic algorithms, since their processing or computing speed significantly affects the security they offer. These would allow breaking those algorithms that until now we believed were very secure. The post-quantum cryptography sector is constantly growing and it is expected that these algorithms in 10 years will be used to protect the world's important information. Consequently, NIST launched a calling signal to choose several cryptographic algorithms that could be standardized and that could be used in the future by large organizations to protect their data. The selection of these algorithms is a time-consuming process that consists of different phases in which these algorithms are put down to different tests by cryptography experts. In this context, in this Final Degree Project, first, we carry out an analysis of those cryptographic algorithms that we have considered most interesting within the NIST signal call for post-quantum cryptographic algorithms. Afterwards, we focus on the study of the McEliece algorithm, analyzing several implementations of it and carrying out a performance study of them. Finally, we have parallelized one of the implementations of the algorithm to run it on GPUs, thus improving the performance of the code.
Description
Trabajo de Fin de Grado en Ingeniería Informática, Facultad de Informática UCM, Departamento de Arquitectura de Computadores y Automática, Curso 2022/2023.