In recent years, there have been many studies on quantum computing and the construction of quantum computers which are capable of breaking conventional number theory-based public key cryptosystems. Therefore, in the not-too-distant future, we need the public key cryptosystems that withstand against the attacks executed by quantum computers, so-called post-quantum cryptosystems. A public key cryptosystem based on polar codes (PKC-PC) has recently been introduced whose security depends on the difficulty of solving the general decoding problem of polar code. In this paper, we first implement the encryption, key generation and decryption algorithms of PKC-PC on Raspberry Pi3. Then, to evaluate its performance, we have measured several related parameters such as execution time, energy consumption, memory consumption and CPU utilization. All these metrics are investigated for encryption/decryption algorithms of PKC-PC with various parameters of polar codes. In the next step, the investigated parameters are compared to the implemented McEliece public key cryptosystem. Analyses of such results show that the execution time of encryption/decryption as well as the energy and memory consumption of PKC-PC is shorter than the McEliece cryptosystem.
翻译:近年来,对量子计算和量子计算机的建造进行了许多研究,这些研究能够打破常规数字基于理论的公用钥匙加密系统。因此,在不远的将来,我们需要公用钥匙加密系统,以抵御量子计算机实施的攻击,即所谓的“Quantum”后加密系统。最近引入了一个基于极地代码的公用钥匙加密系统(PKC-PC),其安全取决于如何解决极地代码的一般解码问题。在本文中,我们首先在Raspberry Pi3上实施PKC-PC的加密、关键生成和解密算法。然后,为了评估其性能,我们测量了几个相关的参数,例如执行时间、能源消耗、记忆消耗和CPU的利用。所有这些参数都是根据极地代码的各种参数对PKC-PC的加密/解密算法(PKC-PC)进行调查的。在下一步,所调查的参数与已执行的McEliece公用钥匙加密系统相比较。对PK-PC的加密/Deceptrophy系统进行了加密、存储时间的缩短。MC-C-Ccal-cal-cal-cal-cal-cal-cal-destrystemal-c-destride-deal-destride-destrymusmation)的分析表明,这是对Pc-C-C-C-C-c-c-c-c-c-c-cal-c-c-cal-cal-cal-cal-dec-cal-cal-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c-c