Agile Acceleration of Stateful Hash-based Signatures in Hardware

被引:4
|
作者
Thoma, Jan Philipp [1 ,2 ]
Hartlief, Darius [1 ,2 ]
Gueneysu, Tim [1 ,2 ]
机构
[1] Ruhr Univ Bochum, Univ Str 150, D-44801 Bochum, NRW, Germany
[2] DFKI GmbH, Robert Hooke Str 1, D-28359 Bremen, Germany
关键词
XMSS; LMS; hardware implementation; post-quantum cryptography; MERKLE TREE TRAVERSAL;
D O I
10.1145/3567426
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of large-scale quantum computers, the current landscape of asymmetric cryptographic algorithms will change dramatically. Today's standards like RSA, DSA, and ElGamal will no longer provide sufficient security against quantum attackers and need to be replaced with novel algorithms. In the face of these developments, NIST has already started a standardization process for new Key Encapsulation Mechanisms (KEMs) and Digital Signatures (DSs). Moreover, NIST has recommended the two stateful Hash-Based Signatures (HBSs) schemes XMSS and LMS for use in devices with a long expected lifetime and limited capabilities for maintenance. Both schemes are also standardized by the IETF. In this work, we present the first agile hardware implementation that supports both LMS and XMSS. Our design can instantiate either LMS, XMSS, or both schemes using a simple configuration setting. Leveraging the vast similarities of the two schemes, the hardware utilization of the agile design increases by 20% in LUTs and only 3% in Flip Flops (FFs) over a standalone XMSS implementation. Furthermore, our approach can easily be configured with an arbitrary number of hash cores and accelerators for the one-time signatures for different application scenarios. We evaluate our implementation on the Xilinx Artix-7 FPGA platform, which is the recommended target for PQC implementations by NIST. We explore potential tradeoffs in the design space and compare our results to previous work in this field.
引用
收藏
页数:29
相关论文
共 50 条
  • [41] Hash-based dynamic source routing
    Castelluccia, C
    Mutaf, P
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1012 - 1023
  • [42] Hardware Acceleration of Hash Operations in Modern Microprocessors
    Fairouz, Abbas A.
    Abusultan, Monther
    Fedorov, Viacheslav V.
    Khatri, Sunil P.
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (09) : 1412 - 1426
  • [43] BLAST: Off-the-shelf hardware for building an efficient hash-based cluster storage system
    Parissis, George
    Xylomenos, George
    Gritzalis, Dimitris
    2009 6TH IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, 2009, : 148 - 155
  • [44] Analysis of a Proposed Hash-Based Signature Standard
    Katz, Jonathan
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
  • [45] A Comparison of Hash-Based Methods for Trajectory Clustering
    Rayatidamavandi, Maede
    Zhuang, Yu
    Rahnamay-Naeini, Mahshid
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
  • [46] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [47] Hash-tree PCA: accelerating PCA with hash-based grouping
    Lkhagvadorj Battulga
    Sang-Hyun Lee
    Aziz Nasridinov
    Kwan-Hee Yoo
    The Journal of Supercomputing, 2020, 76 : 8248 - 8264
  • [48] Metagenome sequence clustering with hash-based canopies
    Rahman, Mohammad Arifur
    LaPierre, Nathan
    Rangwala, Huzefa
    Barbara, Daniel
    JOURNAL OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, 2017, 15 (06)
  • [49] DePass: A Secure Hash-based Authentication Scheme
    Benzekki, Kamal
    El Fergougui, Abdeslam
    ElAlaoui, Abdelbaki ElBelrhiti
    2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
  • [50] A Hash-based Secure Interface on Plain Connection
    Liu, Zhenxing
    Lallie, Harjinder S.
    Liu, Lu
    Zhan, Yongzhao
    Wu, Kaigui
    2011 6TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2011, : 1236 - 1239