### Abstract

LOWMC is a block cipher family designed in 2015 by Albrecht et al. It is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. LOWMC is used in the PICNIC signature scheme, submitted to NIST’s post-quantum standardization project and is a substantial building block in other novel post-quantum cryptosystems. Many LOWMC instances use a relatively recent design strategy (initiated by Gérard et al. at CHES 2013) of applying the non-linear layer to only a part of the state in each round, where the shortage of non-linear operations is partially compensated by heavy linear algebra. Since the high linear algebra complexity has been a bottleneck in several applications, one of the open questions raised by the designers was to reduce it, without introducing additional non-linear operations (or compromising security). In this paper, we consider LOWMC instances with block size n, partial non-linear layers of size s≤ n and r encryption rounds. We redesign LowMC’s linear components in a way that preserves its specification, yet improves LowMC’s performance in essentially every aspect. Most of our optimizations are applicable to all SP-networks with partial non-linear layers and shed new light on this relatively new design methodology. Our main result shows that when s< n, each LOWMC instance belongs to a large class of equivalent instances that differ in their linear layers. We then select a representative instance from this class for which encryption (and decryption) can be implemented much more efficiently than for an arbitrary instance. This yields a new encryption algorithm that is equivalent to the standard one, but reduces the evaluation time and storage of the linear layers from r· n
^{2} bits to about r· n
^{2} -(r-1) (n-s)
^{2} . Additionally, we reduce the size of LowMC’s round keys and constants and optimize its key schedule and instance generation algorithms. All of these optimizations give substantial improvements for small s and a reasonable choice of r. Finally, we formalize the notion of linear equivalence of block ciphers and prove the optimality of some of our results. Comprehensive benchmarking of our optimizations in various LOWMC applications (such as PICNIC) reveals improvements by factors that typically range between 2x and 40x in runtime and memory consumption.

Originalsprache | englisch |
---|---|

Titel | Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings |

Untertitel | 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I |

Redakteure/-innen | Yuval Ishai, Vincent Rijmen |

Herausgeber (Verlag) | Springer |

Seiten | 343-372 |

Seitenumfang | 30 |

ISBN (Print) | 978-3-030-17652-5 |

DOIs | |

Publikationsstatus | Veröffentlicht - 2019 |

Veranstaltung | EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Darmstadt, Deutschland Dauer: 19 Mai 2019 → 23 Mai 2019 https://eurocrypt.iacr.org/2019/ |

### Publikationsreihe

Name | Lecture Notes in Computer Science |
---|---|

Band | 11476 |

### Konferenz

Konferenz | EUROCRYPT 2019 |
---|---|

Land | Deutschland |

Ort | Darmstadt |

Zeitraum | 19/05/19 → 23/05/19 |

Internetadresse |

### Schlagwörter

### ASJC Scopus subject areas

- !!Theoretical Computer Science
- !!Computer Science(all)

## Fingerprint Untersuchen Sie die Forschungsthemen von „Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC“. Zusammen bilden sie einen einzigartigen Fingerprint.

## Dieses zitieren

*Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I*(S. 343-372). (Lecture Notes in Computer Science; Band 11476). Springer. https://doi.org/10.1007/978-3-030-17653-2_12