XMSS Practical Hash-Based Signatures Andreas Hülsing joint work with Johannes Buchmann and Erik Dahmen 23.09.2013 | TU Darmstadt | Andreas Hülsing.

Slides:



Advertisements
Similar presentations
14. Aug Towards Practical Lattice-Based Public-Key Encryption on Reconfigurable Hardware SAC 2013, Burnaby, Canada Thomas Pöppelmann and Tim Güneysu.
Advertisements

Enhancing Demand Response Signal Verification in Automated Demand Response Systems Daisuke Mashima, Ulrich Herberg, and Wei-Peng Chen SEDN (Solutions for.
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
LOGO Multi-user Broadcast Authentication in Wireless Sensor Networks ICU Myunghan Yoo.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Authenticating streamed data in the presence of random packet loss March 17th, Philippe Golle, Stanford University.
1 Intro To Encryption Exercise Analyze the following scenario: Sender:  Cipher1= Encrypt message with symmetric key algorithm  RSA_Encrypt (SHA1(message)
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions J. Buchmann, E. Dahmen, A. Hülsing | TU Darmstadt |
Realizing Hash and Sign Signatures under Standard Assumptions Realizing Hash and Sign Signatures under Standard Assumptions Susan Hohenberger Johns Hopkins.
Bob can sign a message using a digital signature generation algorithm
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
Securing Data Authentication with Cryptographic Signatures in BitTorrent Du Wei cc.hut.fi / Supervisor : Professor Jukka Manner Instructor.
Qian Chen, Haibo Hu, Jianliang Xu Hong Kong Baptist University Authenticated Online Data Integration Services1.
Case Study II: A Web Server CSCI 8710 September 30 th, 2008.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Cryptography Lecture 9 Stefan Dziembowski
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Foundations of Cryptography Lecture 6 Lecturer: Moni Naor.
Hash-Based Signatures Johannes Buchmann, Andreas Hülsung Supported by DFG and DAAD Part XI: XMSS in Practice.
Cryptographic Hash Functions and Protocol Analysis
Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes Albrecht Petzoldt, Stanislav Bulygin and Johannes Buchmann TU Darmstadt,
Lattice Based Signatures Johannes Buchmann Erik Dahmen Richard Lindner Markus Rückert Michael Schneider.
| TU Darmstadt | Andreas Hülsing | 1 Optimal Parameters for XMSS MT Andreas Hülsing, Lea Rausch, and Johannes Buchmann.
International Conference Security in Pervasive Computing(SPC’06) MMC Lab. 임동혁.
Use or disclosure of the contents of this page is restricted by the terms on the notice page Intel Strategy for Post Quantum Crypto Ernie Brickell Presentation.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
| TU Darmstadt | Andreas Hülsing | 1 W-OTS + – Shorter Signatures for Hash-Based Signature Schemes Andreas Hülsing.
Bounded key-dependent message security
SPHINCS: Practical Stateless Hash-based Signatures
CS457 Introduction to Information Security Systems
CMSC 414 Computer and Network Security Lecture 15
B. R. Chandavarkar CSE Dept., NITK Surathkal
Hash-Based Signatures
Chapter 8 Network Security.
CS/ECE 578 Cyber-Security
Digital signatures.
Digital Signature Schemes and the Random Oracle Model
Compact Energy and Delay-Aware Authentication
Practical Aspects of Modern Cryptography
Cryptographic Hash Functions Part I
Long-term secure signatures for the IoT
Hash-based signatures & Hash-and-sign without collision-resistance
ICS 454 Principles of Cryptography
Mitigating Multi-Target-Attacks in Hash-based Signatures
Digital Signature Schemes and the Random Oracle Model
SPHINCS: practical stateless hash-based signatures
CS/ECE 478 Introduction to Network Security
MSc Thesis: Mohammad Khodaei Supervisor: Prof. Panos Papadimitratos
Hash-based Signatures
Fast and Secure CBC-type MACs
Hash-based Signatures
SPHINCS: practical stateless hash-based signatures
Towards A Standard for Practical Hash-based Signatures
Data Integrity: Applications of Cryptographic Hash Functions
Pre-image Resistance: Given a, hard to find b such that ____
ICS 454 Principles of Cryptography
Digital Signatures.
CS 394B Introduction Marco Canini.
Cryptographic Hash Functions Part I
Hash-based Primitives Credits: Dr. Peng Ning and Dr. Adrian Perrig
One Time Signature.
Lecture 4.1: Hash Functions, and Message Authentication Codes
SPHINCS: practical stateless hash-based signatures
SPHINCS+ Submission to the NIST post-quantum project
An attempt to simplify security arguments for hash-based signatures
Cryptography Lecture 27.
Cryptography Lecture 26.
How to Use Charm Crypto Lib
Presentation transcript:

XMSS Practical Hash-Based Signatures Andreas Hülsing joint work with Johannes Buchmann and Erik Dahmen 23.09.2013 | TU Darmstadt | Andreas Hülsing | 1 1. Januar 2019 |

Post-Quantum Signatures Lattice, MQ, Coding Signature and/or key sizes Runtimes Secure parameters 23.09.2013 | TU Darmstadt | Andreas Hülsing | 2 1. Januar 2019 |

Hash-based Signature Schemes [Mer89] Post quantum Only secure hash function Security well understood Fast Inherently forward secure 23.09.2013 | TU Darmstadt | Andreas Hülsing | 3 1. Januar 2019 |

Hash-based Signatures PK SIG = (i=2, , , , , ) H OTS H H H H H H H H H H H H H H OTS OTS OTS OTS OTS OTS OTS OTS SK 23.09.2013 | TU Darmstadt | Andreas Hülsing | 4 1. Januar 2019 |

XMSS 23.09.2013 | TU Darmstadt | Andreas Hülsing | 5

Results Efficient Minimal security assumptions „Small signatures" Forward secure Full smartcard implementation Datum | Fachbereich nn | Institut nn | Prof. nn | 6

New Variants of the Winternitz One Time Signature Scheme OTS 23.09.2013 | TU Darmstadt | Andreas Hülsing | 7

Winternitz OTS (WOTS) [Mer89; EGM96] 1. = f( ) 2. Trade-off between runtime and signature size | | ~ m/log w * | | SIG = (i, , , , , ) 23.09.2013 | TU Darmstadt | Andreas Hülsing | 8 1. Januar 2019 |

WOTS+ [Hül13] Theorem 3.9 (informally): W-OTS+ is strongly unforgeable under chosen message attacks if F is a 2nd-preimage resistant, undetectable one-way function family In our work we showed that we can slightly change the original WOTS construction, such that it uses a function family instead of the hash function family. The resulting scheme is existentially unforgeable under chosen message attacks, if the function family is pseudorandom. This result has two implications: 23.09.2013 | TU Darmstadt | Andreas Hülsing | 9 1. Januar 2019 |

XMSS [BDH11] Lamport-Diffie / WOTS WOTS+ Tree construction [DOTV08] Pseudorandom key generation bi PRG FSPRG 23.09.2013 | TU Darmstadt | Andreas Hülsing | 10

XMSS* in Practice 23.09.2013 | TU Darmstadt | Andreas Hülsing | 11

XMSS Implementations C Implementation [BDH11] C Implementation, using OpenSSL Sign (ms) Verify (ms) Signature (bit) Public Key (bit) Secret Key (byte) Bit Security Comment XMSS-SHA-2 35.60 1.98 16,672 13,600 3,364 157 h = 20, w = 64, XMSS-AES-NI 0.52 0.07 19,616 7,328 1,684 84 w = 4 XMSS-AES 1.06 0.11 RSA 2048 3.08 0.09 ≤ 2,048 ≤ 4,096 ≤ 512 87 2013: 80 bit 84 -> 2019 87 -> 2022 157 -> 2113 Intel(R) Core(TM) i5-2520M CPU @ 2.50GHz with Intel AES-NI 23.09.2013 | TU Darmstadt | Andreas Hülsing | 12 1. Januar 2019 |

XMSS Implementations Smartcard Implementation [HBB12] Sign (ms) Verify (ms) Keygen (ms) Signature (byte) Public Key (byte) Secret Key (byte) Bit Sec. Comment XMSS 134 23 925,400 2,388 800 2,448 92 H = 16, w = 4 XMSS+ 106 25 5,600 3,476 544 3,760 94 RSA 2048 190 7 11,000 ≤ 256 ≤ 512 87 Tkg: - similar to RSA 2048 (11 s) - slower than ECDSA 256 (95ms). Tsign: - comparable to RSA 2048 (190ms) and ECDSA 256 (100ms). Tverify: - slightly slower than RSA 2048 (7ms) - faster than ECDSA 256 (58ms). ECDSA: PK=256~SK, Sig= 512, The security level of RSA 2048 and ECDSA 256 is 95 and 128 bits, respectively 92 -> 2028 94 -> 2031 Infineon SLE78 16Bit-CPU@33MHz, 8KB RAM, TRNG, sym. & asym. co-processor NVM: Card 16.5 million write cycles/ sector, XMSS+ < 5 million write cycles (h=20) 23.09.2013 | TU Darmstadt | Andreas Hülsing | 13 1. Januar 2019 |

Conclusion 23.09.2013 | TU Darmstadt | Andreas Hülsing | 14 1. Januar 2019 |

Conservative Security Conclusion Fast Conservative Security Compact Forward secure 23.09.2013 | TU Darmstadt | Andreas Hülsing | 15

Main Drawback: State Easy Migration? Future Work Interfaces Key Management 23.09.2013 | TU Darmstadt | Andreas Hülsing | 16

Thank you! Questions?