state management for hash based signatures
play

State Management for Hash-Based Signatures David McGrew, Panos - PowerPoint PPT Presentation

State Management for Hash-Based Signatures David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag , Denis Butin, Johannes Buchmann {mcgrew,pkampana,sfmuhrer}@cisco.com stefan-lukas_gazdag@genua.eu


  1. State Management for Hash-Based Signatures � David McGrew, Panos Kampanakis, Scott Fluhrer, Stefan-Lukas Gazdag , Denis Butin, Johannes Buchmann � {mcgrew,pkampana,sfmuhrer}@cisco.com � stefan-lukas_gazdag@genua.eu � {dbutin,buchmann}@cdc.informatik.tu-darmstadt.de SSR 2016

  2. What's so great about HBS? ● Well understood ● Post-Quantum ● No further intractability assumptions other than cryptographic hash functions ● Minimal security requirements feasible � ● Forward secure constructions possible � 12/06/16 2

  3. Intro: Hash-Based Signatures � 0 1 0 1 0 1 signature private key random data random data random data random data random data random data f f f f f f hash hash hash hash hash hash public key 12/06/16 3

  4. Intro: Hash-Based Signatures 12/06/16 4

  5. Statefulness � ● Private key has to be updated – Any copy may reveal secrets – Interrupts may threaten consistency – Key is critical resource – Data to be updated difgers by implementation decisions (Starting from single index to several nodes) 12/06/16 5

  6. How about stateless schemes? � ● SPHINCS (https://sphincs.cr.yp.to/) – Signatures size ~ 41 KB – Slower signing times Sig Size (B) Pub Key Size (B) LMS 2828 100 Defjnitely working for some use cases! XMSS 2820 68 But stateful schemes sometimes still the HSS 8688 112 better choice. XMSS^MT 8392 68 SPHINCS 41k 1056 Similar parameter sets, total height of 30 for LMS and XMSS, 12/06/16 6 total height of 60 for HSS, XMSS^MT and SPHINCS.

  7. How about stateless schemes? � ● SPHINCS (https://sphincs.cr.yp.to/) – Signatures size ~ 41 KB – Slower signing times Defjnitely working for some use cases! But stateful schemes are sometimes still the better choice. 12/06/16 7

  8. What's in line for standardization? � 12/06/16 8

  9. 12/06/16 9

  10. 12/06/16 10 �

  11. 12/06/16 11 �

  12. How can we cope with statefulness? � 12/06/16 12 �

  13. State Synchronization ● Synchronization delay affects performance ● Synchronization failure may occur ● Several copies may exist => Special case of cloning 12/06/16 13 �

  14. 12/06/16 14 The Linux Storage Stack Diagram http://www.thomas-krenn.com/en/wiki/Linux_Storage_Stack_Diagram Created by Werner Fischer and Georg Sc hönberger License: CC-BY-SA 3.0, see http://creativecommons.org/licenses/by-sa/3.0/

  15. 12/06/16 15 The Linux Storage Stack Diagram http://www.thomas-krenn.com/en/wiki/Linux_Storage_Stack_Diagram Created by Werner Fischer and Georg Sc hönberger License: CC-BY-SA 3.0, see http://creativecommons.org/licenses/by-sa/3.0/

  16. A classic digital signature � Scheme = (Key Generation, Signing, Verifjcation) 12/06/16 16 �

  17. A stateful digital signature � Scheme = (Key Generation, Reservation , Signing, Verifjcation) � 12/06/16 17

  18. Reservation ● Keys (pre-) generated in bulk ● Easy access management to critical resource ● Key synchronization and read/write operations alleviated ● Use case specific key pool feasible 12/06/16 18 �

  19. Hierarchical Signatures / Key Reservation � 12/06/16 19

  20. Hierarchical Signatures / Key Reservation � ● Synchronization delay � ● Synchronization failure ● Unintended cloning – Nonvolatile – Volatile 12/06/16 20 �

  21. Hierarchical Signatures / Key Reservation � ● Synchronization delay ● Synchronization failure ● Unintended cloning – Nonvolatile – Volatile 12/06/16 21

  22. Hybrid Scheme and Reservation � 12/06/16 22

  23. Hybrid Scheme and Reservation � ● Synchronization delay � ● Synchronization failure ● Unintended cloning – Nonvolatile – Volatile 12/06/16 23 �

  24. Hybrid Scheme and Reservation � ● Synchronization delay ● Synchronization failure ● Unintended cloning – Nonvolatile – Volatile 12/06/16 24

  25. Hybrid Scheme and Reservation � ● Synchronization delay ● Synchronization failure ● Unintended cloning – Nonvolatile ? – Volatile 12/06/16 25

  26. Hybrid Scheme and Reservation � ● Synchronization delay ● Synchronization failure ● Unintended cloning – Nonvolatile Breaks so much more: – Volatile - Entropy pools and PRNGs - Deterministic IVs and Nonces - Encryption counters - Digital signature seeds - One Time Passwords (OTP) - TCP sequence numbers - ... 12/06/16 26

  27. Conclusion ● First official standards available soon ● Safe deployment / good performance feasible ● Future work: standardization document on HBS deployment 12/06/16 27 �

  28. Any questions? � {mcgrew,pkampana,sfmuhrer}@cisco.com � stefan-lukas_gazdag@genua.eu � {dbutin,buchmann}@cdc.informatik.tu-darmstadt.de � 12/06/16 28 �

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend