Agile Acceleration of Stateful Hash-based Signatures in Hardware

被引:4
|
作者
Thoma, Jan Philipp [1 ,2 ]
Hartlief, Darius [1 ,2 ]
Gueneysu, Tim [1 ,2 ]
机构
[1] Ruhr Univ Bochum, Univ Str 150, D-44801 Bochum, NRW, Germany
[2] DFKI GmbH, Robert Hooke Str 1, D-28359 Bremen, Germany
关键词
XMSS; LMS; hardware implementation; post-quantum cryptography; MERKLE TREE TRAVERSAL;
D O I
10.1145/3567426
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of large-scale quantum computers, the current landscape of asymmetric cryptographic algorithms will change dramatically. Today's standards like RSA, DSA, and ElGamal will no longer provide sufficient security against quantum attackers and need to be replaced with novel algorithms. In the face of these developments, NIST has already started a standardization process for new Key Encapsulation Mechanisms (KEMs) and Digital Signatures (DSs). Moreover, NIST has recommended the two stateful Hash-Based Signatures (HBSs) schemes XMSS and LMS for use in devices with a long expected lifetime and limited capabilities for maintenance. Both schemes are also standardized by the IETF. In this work, we present the first agile hardware implementation that supports both LMS and XMSS. Our design can instantiate either LMS, XMSS, or both schemes using a simple configuration setting. Leveraging the vast similarities of the two schemes, the hardware utilization of the agile design increases by 20% in LUTs and only 3% in Flip Flops (FFs) over a standalone XMSS implementation. Furthermore, our approach can easily be configured with an arbitrary number of hash cores and accelerators for the one-time signatures for different application scenarios. We evaluate our implementation on the Xilinx Artix-7 FPGA platform, which is the recommended target for PQC implementations by NIST. We explore potential tradeoffs in the design space and compare our results to previous work in this field.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures
    Wagner, Alexander
    Oberhansl, Felix
    Schink, Marc
    PROCEEDINGS OF THE 2022 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2022, 2022, : 85 - 94
  • [2] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [3] Hash-based signatures for the Internet of Things
    Palmieri, Paolo
    2018 ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2018, : 332 - 335
  • [4] Improving Stateless Hash-Based Signatures
    Aumasson, Jean-Philippe
    Endignoux, Guillaume
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 219 - 242
  • [5] State Management for Hash-Based Signatures
    McGrew, David
    Kampanakis, Panos
    Fluhrer, Scott
    Gazdag, Stefan-Lukas
    Butin, Denis
    Buchmann, Johannes
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 244 - 260
  • [6] Hash-Based Signatures: State of Play
    Butin, Denis
    IEEE SECURITY & PRIVACY, 2017, 15 (04) : 37 - 43
  • [7] Extended version-to be, or not to be stateful: post-quantum secure boot using hash-based signatures
    Wagner, Alexander
    Oberhansl, Felix
    Schink, Marc
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (04) : 631 - 648
  • [8] Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
    Noel, Moses Dogonyaro
    Waziri, Onomza Victor
    Abdulhamid, Muhammad Shafii
    Ojeniyi, Adebayo Joseph
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [9] Hash-Based TPM Signatures for the Quantum World
    Ando, Megumi
    Guttman, Joshua D.
    Papaleo, Alberto R.
    Scire, John
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
  • [10] Fast hash-based signatures on constrained devices
    Rohde, Sebastian
    Eisenbarth, Thomas
    Dahmen, Erik
    Buchmann, Johannes
    Paar, Christof
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +