Saber
Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In this paper, we introduce Saber, a package of cryptographic primitives whose security relies on the hardness of the Module Learning With Rounding problem (Mod-LWR). We first describe a secure Diffie-Hellman type key exchange protocol, which is then transformed into an IND-CPA encryption scheme and finally into an IND-CCA secure key encapsulation mechanism using a post-quantum version of the Fujisaki-Okamoto transform. The design goals of this package were simplicity, efficiency and flexibility resulting in the following choices: all integer moduli are powers of 2 avoiding modular reduction and rejection sampling entirely; the use of LWR halves the amount of randomness required compared to LWE-based schemes and reduces bandwidth; the module structure provides flexibility by reusing one core component for multiple security levels. A constant-time AVX2 optimized software implementation of the KEM with parameters providing more than 128 bits of post-quantum security, requires only 101K, 125K and 129K cycles for key generation, encapsulation and decapsulation respectively on a Dell laptop with an Intel i7-Haswell processor.
Keywords for this software
References in zbMATH (referenced in 6 articles , 1 standard article )
Showing results 1 to 6 of 6.
Sorted by year (- Nimbe, Peter; Weyori, Benjamin Asubam; Adekoya, Adebayo Felix: A novel classical and quantum cryptographic scheme for data encryption (2022)
- Bert, Pauline; Eberhart, Gautier; Prabel, Lucas; Roux-Langlois, Adeline; Sabt, Mohamed: Implementation of lattice trapdoors on modules and applications (2021)
- Liang, Zhichuang; Shen, Shiyu; Shi, Yuantao; Sun, Dongni; Zhang, Chongxuan; Zhang, Guoyun; Zhao, Yunlei; Zhao, Zhixiang: Number theoretic transform: generalization, optimization, concrete analysis and applications (2021)
- Sehrawat, Vipin Singh; Yeo, Foo Yee; Desmedt, Yvo: Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (2021)
- Seck, Michel; Sow, Djiby: BI-NTRU encryption schemes: two new secure variants of NTRU (2019)
- D’Anvers, Jan-Pieter; Karmakar, Angshuman; Sinha Roy, Sujoy; Vercauteren, Frederik: Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM (2018)