Skip to main content
Log in

Universal Gaussian elimination hardware for cryptographic purposes

  • Research Article
  • Published:
Journal of Cryptographic Engineering Aims and scope Submit manuscript

Abstract

In this paper, we investigate the possibility of performing Gaussian elimination for arbitrary binary matrices on hardware. In particular, we presented a generic approach for hardware-based Gaussian elimination, which is able to process both non-singular and singular matrices. Previous works on hardware-based Gaussian elimination can only process non-singular ones. However, a plethora of cryptosystems, for instance, quantum-safe key encapsulation mechanisms based on rank-metric codes, ROLLO and RQC, which are among NIST post-quantum cryptography standardization round-2 candidates, require performing Gaussian elimination for random matrices regardless of the singularity. We accordingly implemented an optimized and parameterized Gaussian eliminator for (singular) matrices over binary fields, making the intense computation of linear algebra feasible and efficient on hardware. To the best of our knowledge, this work solves for the first time eliminating a singular matrix on reconfigurable hardware and also describes the a generic hardware architecture for rank-code based cryptographic schemes. The experimental results suggest hardware-based Gaussian elimination can be done in linear time regardless of the matrix type.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Algorithm 2
Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Algorithm 3
Algorithm 4

Similar content being viewed by others

Notes

  1. The automation tools and reference implementations can be found at https://github.com/davidhoo1988/gaussian-elimination-hardware.

References

  1. Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient algorithms for solving overdefined systems of multivariate polynomial equations. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 392–407. Springer (2000)

  2. Yang, B.-Y., Chen, J.-M., Courtois, N.T.: On asymptotic security estimates in XL and Gröbner bases-related algebraic cryptanalysis. In: International Conference on Information and Communications Security, pp. 401–413. Springer (2004)

  3. Ding, J., Schmidt, D.: Rainbow, a new multivariable polynomial signature scheme. In: International Conference on Applied Cryptography and Network Security, pp. 164–175. Springer (2005)

  4. Bogdanov, A., Eisenbarth, T., Rupp, A., Wolf, C.: Time-area optimized public-key engines: MQ-cryptosystems as replacement for elliptic curves? In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 45–61. Springer (2008)

  5. Philippe Gaborit, J.-C.D.e.a.: ROLLO—Rank-Ouroboros, LAKE, LOCKER, Updated on April 21st. https://pqc-rollo.org/doc/rollo-specification_2020-04-21.pdf (2020)

  6. Hochet, B., Quinton, P., Robert, Y.: Systolic Gaussian elimination over GF (p) with partial pivoting. IEEE Trans. Comput. 38(9), 1321–1324 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  7. Wang, C.-L., Lin, J.-L.: A systolic architecture for computing inverses and divisions in finite fields \(GF(2^m)\). IEEE Trans. Comput. 42(9), 1141–1146 (1993)

    Article  MathSciNet  MATH  Google Scholar 

  8. Rupp, A., Eisenbarth, T., Bogdanov, A., Grieb, O.: Hardware SLE solvers: efficient building blocks for cryptographic and cryptanalytic applications. Integration 44(4), 290–304 (2011)

    Article  Google Scholar 

  9. Tang, S., Yi, H., Ding, J., Chen, H., Chen, G.: High-speed hardware implementation of rainbow signature on FPGAS. In: International Workshop on Post-Quantum Cryptography, pp. 228–243. Springer (2011)

  10. Balasubramanian, S., Carter, H.W., Bogdanov, A., Rupp, A., Ding, J.: Fast multivariate signature generation in hardware: the case of rainbow. In: 2008 International Conference on Application-Specific Systems, Architectures and Processors, pp. 25–30. IEEE (2008)

  11. Shoufan, A., Wink, T., Molter, H.G., Huss, S.A., Kohnert, E.: A novel cryptoprocessor architecture for the McEliece public-key cryptosystem. IEEE Trans. Comput. 59(11), 1533–1546 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  12. Wang, W., Szefer, J., Niederhagen, R.: FPGA-based key generator for the Niederreiter cryptosystem using binary Goppa codes. In: International Conference on Cryptographic Hardware and Embedded Systems, pp. 253–274. Springer (2017)

  13. Gaborit, P., Murat, G., Ruatta, O., Zémor, G.: Low rank parity check codes and their application to cryptography. In: Proceedings of the Workshop on Coding and Cryptography WCC, vol. 2013 (2013)

  14. Hofheinz, D., Hövelmanns, K., Kiltz, E.: A modular analysis of the Fujisaki–Okamoto transformation. In: Theory of Cryptography Conference, pp. 341–371. Springer (2017)

  15. Wang, W., Szefer, J., Niederhagen, R.: Solving large systems of linear equations over gf (2) on FPGAS. In: 2016 International Conference on ReConFigurable Computing and FPGAs (ReConFig), pp. 1–7. IEEE (2016)

  16. Chen, P.-J., Chou, T., Deshpande, S., Lahr, N., Niederhagen, R., Szefer, J., Wang, W.: Complete and improved FPGA implementation of classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. (2022). https://doi.org/10.46586/tches.v2022.i3.71-113

    Article  MATH  Google Scholar 

  17. Philippe Gaborit, J.-C.D.: Hamming Quasi-Cyclic (HQC) April 2020. https://pqc-hqc.org/doc/hqc-specification_2020-10-01.pdf (2020)

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China under Grant 62002023, in part by Guangdong Provincial Key Laboratory IRADS under Grant 2022B1212010006 and Grant R0400001-22, in part by Guangdong Province General Universities Key Field Project (New Generation Information Technology) under Grant 2023ZDZX1033, in part by UIC Research under Grant UICR04202401-21, and in part by A\(^*\)Star, Singapore under research grant SERC A19E3b0099.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donglong Chen.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, J., Wang, W., Gaj, K. et al. Universal Gaussian elimination hardware for cryptographic purposes. J Cryptogr Eng 14, 383–397 (2024). https://doi.org/10.1007/s13389-024-00355-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13389-024-00355-3

Keywords

Navigation