Improve double_keccak() intrinsic on ARM when SHA3 instructions are not available

XMLWordPrintable

    • Type: Enhancement
    • Resolution: Unresolved
    • Priority: P3
    • None
    • Affects Version/s: None
    • Component/s: security-libs
    • arm

      Currently the double_keccak() ARM intrinsic uses an implementation of SHA3 that relies on both Neon and specialized cryptographic instructions that are not available on many platforms, including Neoverse. This causes ML-KEM to use the Java implementation of double_keccak() on these machines, taking a large performance hit as a result. To fix this, a second implementation is required that only uses GPRs and the generate_sha3_implCompress_gpr() intrinsic.

            Assignee:
            Ben Perez
            Reporter:
            Ben Perez
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated: