Agile Acceleration of Stateful Hash-based Signatures in Hardware

被引:4
|
作者
Thoma, Jan Philipp [1 ,2 ]
Hartlief, Darius [1 ,2 ]
Gueneysu, Tim [1 ,2 ]
机构
[1] Ruhr Univ Bochum, Univ Str 150, D-44801 Bochum, NRW, Germany
[2] DFKI GmbH, Robert Hooke Str 1, D-28359 Bremen, Germany
关键词
XMSS; LMS; hardware implementation; post-quantum cryptography; MERKLE TREE TRAVERSAL;
D O I
10.1145/3567426
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of large-scale quantum computers, the current landscape of asymmetric cryptographic algorithms will change dramatically. Today's standards like RSA, DSA, and ElGamal will no longer provide sufficient security against quantum attackers and need to be replaced with novel algorithms. In the face of these developments, NIST has already started a standardization process for new Key Encapsulation Mechanisms (KEMs) and Digital Signatures (DSs). Moreover, NIST has recommended the two stateful Hash-Based Signatures (HBSs) schemes XMSS and LMS for use in devices with a long expected lifetime and limited capabilities for maintenance. Both schemes are also standardized by the IETF. In this work, we present the first agile hardware implementation that supports both LMS and XMSS. Our design can instantiate either LMS, XMSS, or both schemes using a simple configuration setting. Leveraging the vast similarities of the two schemes, the hardware utilization of the agile design increases by 20% in LUTs and only 3% in Flip Flops (FFs) over a standalone XMSS implementation. Furthermore, our approach can easily be configured with an arbitrary number of hash cores and accelerators for the one-time signatures for different application scenarios. We evaluate our implementation on the Xilinx Artix-7 FPGA platform, which is the recommended target for PQC implementations by NIST. We explore potential tradeoffs in the design space and compare our results to previous work in this field.
引用
收藏
页数:29
相关论文
共 50 条
  • [21] Reliable Hash Trees for Post-quantum Stateless Cryptographic Hash-based Signatures
    Mozaffari-Kermani, Mehran
    Azarderakhsh, Reza
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 103 - 108
  • [22] Improved constant-sum encodings for hash-based signatures
    Perin, Lucas Pandolfo
    Zambonin, Gustavo
    Custodio, Ricardo
    Moura, Lucia
    Panario, Daniel
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (04) : 329 - 351
  • [23] Mitigating Multi-target Attacks in Hash-Based Signatures
    Hulsing, Andreas
    Rijneveld, Joost
    Song, Fang
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 387 - 416
  • [24] Improved constant-sum encodings for hash-based signatures
    Lucas Pandolfo Perin
    Gustavo Zambonin
    Ricardo Custódio
    Lucia Moura
    Daniel Panario
    Journal of Cryptographic Engineering, 2021, 11 : 329 - 351
  • [25] Precomputation Methods for Hash-Based Signatures on Energy-Harvesting Platforms
    Aysu, Aydin
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2925 - 2931
  • [26] Optimization of Stateful Hardware Acceleration in Hybrid Architectures
    Chang, Xiaotao
    Ma, Yike
    Franke, Hubertus
    Wang, Kun
    Hou, Rui
    Yu, Hao
    Nelms, Terry
    2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE), 2011, : 567 - 570
  • [27] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [28] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [29] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [30] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)