Abstract
In this paper, we investigate the possibility of performing Gaussian elimination for arbitrary binary matrices on hardware. In particular, we presented a generic approach for hardware-based Gaussian elimination, which is able to process both non-singular and singular matrices. Previous works on hardware-based Gaussian elimination can only process non-singular ones. However, a plethora of cryptosystems, for instance, quantum-safe key encapsulation mechanisms based on rank-metric codes, ROLLO and RQC, which are among NIST post-quantum cryptography standardization round-2 candidates, require performing Gaussian elimination for random matrices regardless of the singularity. We accordingly implemented an optimized and parameterized Gaussian eliminator for (singular) matrices over binary fields, making the intense computation of linear algebra feasible and efficient on hardware. To the best of our knowledge, this work solves for the first time eliminating a singular matrix on reconfigurable hardware and also describes the a generic hardware architecture for rank-code based cryptographic schemes. The experimental results suggest hardware-based Gaussian elimination can be done in linear time regardless of the matrix type.
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Figa_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Figb_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig1_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig2_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig3_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig4_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig5_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig6_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig7_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig8_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig9_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Fig10_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Figc_HTML.png)
![](https://cdn.statically.io/img/media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs13389-024-00355-3/MediaObjects/13389_2024_355_Figd_HTML.png)
Similar content being viewed by others
Notes
The automation tools and reference implementations can be found at https://github.com/davidhoo1988/gaussian-elimination-hardware.
References
Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 392–407. Springer (2000)
Yang, B.-Y., Chen, J.-M., Courtois, N.T.: On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis. In: International Conference on Information and Communications Security, pp. 401–413. Springer (2004)
Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: International Conference on Applied Cryptography and Network Security, pp. 164–175. Springer (2005)
Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves? In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 45–61. Springer (2008)
Philippe Gaborit, J.-C.D.e.a.: ROLLO—Rank-Ouroboros, LAKE, LOCKER, Updated on April 21st. https://pqc-rollo.org/doc/rollo-specification_2020-04-21.pdf (2020)
Hochet, B., Quinton, P., Robert, Y.: Systolic Gaussian elimination over GF (p) with partial pivoting. IEEE Trans. Comput. 38(9), 1321–1324 (1989)
Wang, C.-L., Lin, J.-L.: A systolic architecture for computing inverses and divisions in finite fields \(GF(2^m)\). IEEE Trans. Comput. 42(9), 1141–1146 (1993)
Rupp, A., Eisenbarth, T., Bogdanov, A., Grieb, O.: Hardware SLE solvers: efficient building blocks for cryptographic and cryptanalytic applications. Integration 44(4), 290–304 (2011)
Tang, S., Yi, H., Ding, J., Chen, H., Chen, G.: High-speed hardware implementation of rainbow signature on FPGAS. In: International Workshop on Post-Quantum Cryptography, pp. 228–243. Springer (2011)
Balasubramanian, S., Carter, H.W., Bogdanov, A., Rupp, A., Ding, J.: Fast multivariate signature generation in hardware: the case of rainbow. In: 2008 International Conference on Application-Specific Systems, Architectures and Processors, pp. 25–30. IEEE (2008)
Shoufan, A., Wink, T., Molter, H.G., Huss, S.A., Kohnert, E.: A novel cryptoprocessor architecture for the McEliece public-key cryptosystem. IEEE Trans. Comput. 59(11), 1533–1546 (2010)
Wang, W., Szefer, J., Niederhagen, R.: FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes. In: International Conference on Cryptographic Hardware and Embedded Systems, pp. 253–274. Springer (2017)
Gaborit, P., Murat, G., Ruatta, O., Zémor, G.: Low rank parity check codes and their application to cryptography. In: Proceedings of the Workshop on Coding and Cryptography WCC, vol. 2013 (2013)
Hofheinz, D., Hövelmanns, K., Kiltz, E.: A modular analysis of the Fujisaki–Okamoto transformation. In: Theory of Cryptography Conference, pp. 341–371. Springer (2017)
Wang, W., Szefer, J., Niederhagen, R.: Solving large systems of linear equations over gf (2) on FPGAS. In: 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1–7. IEEE (2016)
Chen, P.-J., Chou, T., Deshpande, S., Lahr, N., Niederhagen, R., Szefer, J., Wang, W.: Complete and improved FPGA implementation of classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2022). https://doi.org/10.46586/tches.v2022.i3.71-113
Philippe Gaborit, J.-C.D.: Hamming Quasi-Cyclic (HQC) April 2020. https://pqc-hqc.org/doc/hqc-specification_2020-10-01.pdf (2020)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China under Grant 62002023, in part by Guangdong Provincial Key Laboratory IRADS under Grant 2022B1212010006 and Grant R0400001-22, in part by Guangdong Province General Universities Key Field Project (New Generation Information Technology) under Grant 2023ZDZX1033, in part by UIC Research under Grant UICR04202401-21, and in part by A\(^*\)Star, Singapore under research grant SERC A19E3b0099.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Hu, J., Wang, W., Gaj, K. et al. Universal Gaussian elimination hardware for cryptographic purposes. J Cryptogr Eng 14, 383–397 (2024). https://doi.org/10.1007/s13389-024-00355-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13389-024-00355-3