4 research outputs found

    Efficient Hardware Implementation of Constant Time Sampling for HQC

    Full text link
    HQC is one of the code-based finalists in the last round of the NIST post quantum cryptography standardization process. In this process, security and implementation efficiency are key metrics for the selection of the candidates. A critical compute kernel with respect to efficient hardware implementations and security in HQC is the sampling method used to derive random numbers. Due to its security criticality, recently an updated sampling algorithm was presented to increase its robustness against side-channel attacks. In this paper, we pursue a cross layer approach to optimize this new sampling algorithm to enable an efficient hardware implementation without comprising the original algorithmic security and side-channel attack robustness. We compare our cross layer based implementation to a direct hardware implementation of the original algorithm and to optimized implementations of the previous sampler version. All implementations are evaluated using the Xilinx Artix 7 FPGA. Our results show that our approach reduces the latency by a factor of 24 compared to the original algorithm and by a factor of 28 compared to the previously used sampler with significantly less resources

    Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks?

    No full text
    Recent progress in quantum computers severely endangers the security of widely used public-key cryptosystems and of all communication that relies on it. Thus, the US NIST is currently exploring new post-quantum cryptographic algorithms that are robust against quantum computers. Security is seen as one of the most critical issues of low-power IoT devices—even with pre-quantum public-key cryptography—since IoT devices have tight energy constraints, limited computational power and strict memory limitations. In this paper, we present, to the best of our knowledge, the first in-depth investigation of the application of potential post-quantum key encapsulation mechanisms (KEMs) and digital signature algorithms (DSAs) proposed in the related US NIST process to a state-of-the-art, TLS-based, low-power IoT infrastructure. We implemented these new KEMs and DSAs in such a representative infrastructure and measured their impact on energy consumption, latency and memory requirements during TLS handshakes on an IoT edge device. Based on our investigations, we gained the following new insights. First, we show that the main contributor to high TLS handshake latency is the higher bandwidth requirement of post-quantum primitives rather than the cryptographic computation itself. Second, we demonstrate that a smart combination of multiple DSAs yields the most energy-, latency- and memory-efficient public key infrastructures, in contrast to NIST’s goal to standardize only one algorithm. Third, we show that code-based, isogeny-based and lattice-based algorithms can be implemented on a low-power IoT edge device based on an off-the-shelf Cortex M4 microcontroller while maintaining viable battery runtimes. This is contrary to much research that claims dedicated hardware accelerators are mandatory

    Gender disparities in high-quality dermatology research : a descriptive bibliometric study on scientific authorships

    No full text
    Objective: The present study aims to elucidate the state of gender equality in high-quality dermatological research by analysing the representation of female authorships from January 2008 to May 2017. Design: Retrospective, descriptive study. Setting: 113 189 male and female authorships from 23 373 research articles published in 23 dermatological Q1 journals were analysed with the aid of the Gendermetrics Platform. Results: 43.0% of all authorships and 50.2% of the firstauthorships, 43.7% of the coauthorships and 33.1% of the last authorships are held by women. The corresponding female-to-male ORs are 1.41 (95% CI 1.37 to 1.45) for first authorships, 1.07 (95% CI 1.04 to 1.10) for coauthorships and 0.60 (95% CI 0.58 to 0.62) for last authorships. The annual growth rates are 1.74% overall and 1.45% for first authorships, 1.53% for coauthorships and 2.97% for last authorships. Women are slightly under-represented at prestigious authorships compared with men (Prestige Index=−0.11). The under-representation remains stable in highly competitive articles attracting the highest citation rates, namely, articles with many authors and articles that were published in highest-impact journals. Multiauthor articles with male key authors are only slightly more frequently cited than those with female key authors. Women publish slightly fewer papers compared with men (47.2% women hold 43.0% of the authorships). At the level of individual journals, there is a high degree of uniformity in gender-specific authorship odds. By contrast, distinct differences at country level were revealed. The prognosis for the next decades forecasts a consecutive harmonisation of authorship odds between the two genders. Conclusions: In high-quality dermatological research, the integration of female scholars is advanced as compared with other medical disciplines. A gender gap consists mainly in the form of a career dichotomy, with many female early career researchers and few women in academic leadership positions. However, this gender gap has been narrowed in the last decade and will likely be further reduced in the future
    corecore