Polynomial multiplication on embedded vector architectures

Authors

  • Hanno Becker Arm Ltd, Cambridge, UK
  • Jose Maria Bermudo Mera imec-COSIC, KU Leuven Kasteelpark Arenberg 10, Bus 2452, B-3001 Leuven-Heverlee, Belgium
  • Angshuman Karmakar imec-COSIC, KU Leuven Kasteelpark Arenberg 10, Bus 2452, B-3001 Leuven-Heverlee, Belgium
  • Joseph Yiu Arm Ltd, Cambridge, UK
  • Ingrid Verbauwhede imec-COSIC, KU Leuven Kasteelpark Arenberg 10, Bus 2452, B-3001 Leuven-Heverlee, Belgium

DOI:

https://doi.org/10.46586/tches.v2022.i1.482-505

Keywords:

Post-Quantum Cryptography, Polynomial multiplication, IoT, Cortex-M55, Cortex-M4, M-profile Vector Extension (MVE), Helium vector extension, Number Theoretic Transform (NTT), Toom-Cook, Karatsuba

Abstract

High-degree, low-precision polynomial arithmetic is a fundamental computational primitive underlying structured lattice based cryptography. Its algorithmic properties and suitability for implementation on different compute platforms is an active area of research, and this article contributes to this line of work: Firstly, we present memory-efficiency and performance improvements for the Toom-Cook/Karatsuba polynomial multiplication strategy. Secondly, we provide implementations of those improvements on Arm® Cortex®-M4 CPU, as well as the newer Cortex-M55 processor, the first M-profile core implementing the M-profile Vector Extension (MVE), also known as Arm® Helium™ technology. We also implement the Number Theoretic Transform (NTT) on the Cortex-M55 processor. We show that despite being singleissue, in-order and offering only 8 vector registers compared to 32 on A-profile SIMD architectures like Arm® Neon™ technology and the Scalable Vector Extension (SVE), by careful register management and instruction scheduling, we can obtain a 3× to 5× performance improvement over already highly optimized implementations on Cortex-M4, while maintaining a low area and energy profile necessary for use in embedded market. Finally, as a real-world application we integrate our multiplication techniques to post-quantum key-encapsulation mechanism Saber

Downloads

Published

2021-11-19

Issue

Section

Articles

How to Cite

Polynomial multiplication on embedded vector architectures. (2021). IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022(1), 482-505. https://doi.org/10.46586/tches.v2022.i1.482-505