A Performance Boost for Hash-Based Signatures

نویسندگان

  • Thomas Eisenbarth
  • Ingo von Maurich
  • Christof Paar
  • Xin Ye
چکیده

Digital signatures have become a key component of many embedded system solutions and are facing strong security and efficiency requirements. In this work, algorithmic improvements for the authentication path computation decrease the average signature computation time by close to 50% when compared to state-of-the-art algorithms. The proposed scheme is implemented on an Intel Core i7 CPU and an AVR ATxmega microcontroller with optimized versions for the respective target platform. The theoretical algorithmic improvements are verified and cryptographic hardware accelerators are used to achieve competitive performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive non-critical alarm reduction using hash-based contextual signatures in intrusion detection

Signature-based intrusion detection systems (IDSs) have been widely deployed in network environments aiming to defend against different kinds of attacks. However, a large number of alarms, especially noncritical alarms could be generated during the detection, which can greatly lower the effectiveness of detection and increase the difficulty in analyzing the generated IDS alarms. The main reason...

متن کامل

High Performance of Hash-based Signature Schemes

Hash-based signature schemes, whose security is based on properties of the underlying hash functions, are promising candidates to be quantum-safe digital signatures schemes. In this work, we present a software implementation of two recent standard proposals for hash-based signature schemes, Leighton and Micali Signature (LMS) scheme and Extended Merkle Signature Scheme (XMSS), using a set of AV...

متن کامل

Design and Implementation of Signatures for Transactional Memory Systems

Transactional Memory (TM) systems ease multithreaded application development by giving the programmer the ability to specify that some regions of code, called transactions, must be executed atomically. To achieve high efficiency, TM systems optimistically try to execute multiple transactions concurrently and either stall or abort some of them if a conflict occurs. A conflict happens if two or m...

متن کامل

State Management for Hash-Based Signatures

The unavoidable transition to post-quantum cryptography requires mature quantum-safe digital signature schemes. Hash-based signatures are well-understood and promising candidates. A common concern regarding their deployment is their statefulness, due to their use of one-time signature schemes. While the theory of hash-based signatures is mature, a complete understanding of the system security i...

متن کامل

Let Live and Let Die: Handling the State of Hash-based Signatures

Real-world use of digital signatures currently relies on algo­ rithms that will be broken once quantum computers become available. Quantum-safe alternatives exist; in particular, hash-based schemes offer adequate performance and security and are seen as a fitting solution for post-quantum signatures. Unfortunately, they are not used at large because practical hurdles have not yet been overcome....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013