pq-crystals.org Open in urlscan Pro
2001:8d8:100f:f000::2e4  Public Scan

Submitted URL: http://pq-crystals.org/
Effective URL: https://pq-crystals.org/
Submission: On April 11 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

CRYSTALS


CRYPTOGRAPHIC SUITE FOR ALGEBRAIC LATTICES

CRYSTALS
Kyber
Dilithium

The "Cryptographic Suite for Algebraic Lattices" (CRYSTALS) encompasses two
cryptographic primitives: Kyber, an IND-CCA2-secure key-encapsulation mechanism
(KEM); and Dilithium, a strongly EUF-CMA-secure digital signature algorithm.
Both algorithms are based on hard problems over module lattices, are designed to
withstand attacks by large quantum computers, and have been submitted to the
NIST post-quantum cryptography project.


MODULE LATTICES

Module lattices can be thought of as lattices that lie between the ones used in
the definitions of the LWE problem, and those used for the Ring-LWE problem. If
the ring underlying the module has a sufficiently high degree (like 256), then
these lattices inherit all the efficiency of the ones used in the Ring-LWE
problem, and additionally have the following advantages, when used in our
cryptographic algorithms:

 * The only operations required for Kyber and Dilithium for all security levels
   are variants of Keccak, additions/multiplications in Zq for a fixed q, and
   the NTT (number theoretic transform) for the ring Zq[X]/(X256+1).
   This means that increasing/decreasing the security level involves virtually
   no re-implementation of the schemes in software or hardware. Changing a few
   parameters is all that one needs to convert an optimized implementation for
   one security level into an optimized implementation for a different one.
 * The lattices used in Kyber and Dilithium have less algebraic structure than
   those used for Ring-LWE and are closer to the unstructured lattices used in
   LWE.  It is therefore conceivable that if algebraic attacks against Ring-LWE
   appear (there are none that we are aware of at this point), then they may be
   less effective against schemes like Kyber and Dilithium.


NEWS

 * 2019-05-21: New paper on Kyber on Cortex-M4
 * 2019-03-30: CRYSTALS round-2 versions are submitted and online.
 * 2017-12-30: CRYSTALS website is online


CREDITS

The design and implementation of Kyber and Dilithium have been supported by

 * the European Commission through the ICT program under contract ICT-645622
   (PQCRYPTO);
 * the European Commission through the ICT program under contract ICT-644729
   (SAFEcrypto);
 * the Swiss National Science Foundation through the 2014 transfer ERC Starting
   Grant  CRETP2-166734 (FELICITY);
 * the Netherlands Organization for Scientific Research (NWO) through Veni grant
   639.021.645 (Cryptanalysis of Lattice-based Cryptography);
 * the European Commission through the ERC Starting Grant ERC-2013-StG-335086
   (LATTAC);
 * the European Commission through the ERC Consolidator Grant
   ERC-2013-CoG-615073 (ERCC);
 * the European Commission through the ERC Starting Grant ERC-2018-StG-805031
   (EPOQUE);
 * the DFG through the Cluster of Excellence 2092 (CASA).

Institutions involved in the design of Kyber and Dilithium:


CRYSTALS TEAM

 * Roberto Avanzi, ARM Limited (DE)
 * Joppe Bos, NXP Semiconductors (BE)
 * Léo Ducas, CWI Amsterdam (NL)
 * Eike Kiltz, Ruhr University Bochum (DE)
 * Tancrède Lepoint, SRI International (US)
 * Vadim Lyubashevsky, IBM Research Zurich (CH)
 * John M. Schanck, University of Waterloo (CA)
 * Peter Schwabe, MPI-SP (DE) & Radboud University (NL)
 * Gregor Seiler, IBM Research Zurich (CH)
 * Damien Stehle, ENS Lyon (FR)


CONTACT

 * authors@pq-crystals.org

Design 2017 by Peter Schwabe, last updated Feb 25, 2022
Title photo by James Mann (modified) (CC BY 2.0)