Skip to main content

2020 | OriginalPaper | Buchkapitel

XMSS and Embedded Systems

XMSS Hardware Accelerators for RISC-V

verfasst von : Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen

Erschienen in: Selected Areas in Cryptography – SAC 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We describe a software-hardware co-design for the hash-based post-quantum signature scheme XMSS on a RISC-V embedded processor. We provide software optimizations for the XMSS reference implementation for SHA-256 parameter sets and several hardware accelerators that allow to balance area usage and performance based on individual needs. By integrating our hardware accelerators into the RISC-V processor, the version with the best time-area product generates a key pair (that can be used to generate \(2^{10}\) signatures) in 3.44 s, achieving an over \(54 \times \) speedup in wall-clock time compared to the pure software version. For such a key pair, signature generation takes less than 10 ms and verification takes less than 6 ms, bringing speedups of over \(42 \times \) and \(17 \times \) respectively. We tested and measured the cycle count of our implementation on an Intel Cyclone V SoC FPGA. The integration of our XMSS accelerators into an embedded RISC-V processor shows that it is possible to use hash-based post-quantum signatures for a large variety of embedded applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amiet, D., Curiger, A., Zbinden, P.: FPGA-based accelerator for post-quantum signature scheme SPHINCS-256. Crypt. Hardw. Embed. Syst. (CHES) 2018(1), 18–39 (2018). Open Access Amiet, D., Curiger, A., Zbinden, P.: FPGA-based accelerator for post-quantum signature scheme SPHINCS-256. Crypt. Hardw. Embed. Syst. (CHES) 2018(1), 18–39 (2018). Open Access
3.
Zurück zum Zitat Aysu, A., Schaumont, P.: Precomputation methods for faster and greener post-quantum cryptography on emerging embedded platforms. IACR ePrint Archive, Report 2015/288 (2015) Aysu, A., Schaumont, P.: Precomputation methods for faster and greener post-quantum cryptography on emerging embedded platforms. IACR ePrint Archive, Report 2015/288 (2015)
6.
Zurück zum Zitat Buchmann, J., Dahmen, E., Hülsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117–129. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25405-5_8. second Version, IACR ePrint Archive, Report 2011/484CrossRef Buchmann, J., Dahmen, E., Hülsing, A.: XMSS - a practical forward secure signature scheme based on minimal security assumptions. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 117–129. Springer, Heidelberg (2011). https://​doi.​org/​10.​1007/​978-3-642-25405-5_​8. second Version, IACR ePrint Archive, Report 2011/484CrossRef
8.
Zurück zum Zitat García, R., Algredo-Badillo, I., Morales-Sandoval, M., Feregrino-Uribe, C., Cumplido, R.: A compact FPGA-based processor for the secure hash algorithm SHA-256. Comput. Electr. Eng. 40(1), 194–202 (2014)CrossRef García, R., Algredo-Badillo, I., Morales-Sandoval, M., Feregrino-Uribe, C., Cumplido, R.: A compact FPGA-based processor for the secure hash algorithm SHA-256. Comput. Electr. Eng. 40(1), 194–202 (2014)CrossRef
9.
Zurück zum Zitat Ghosh, S., Misoczki, R., Sastry, M.R.: Lightweight post-quantum-secure digital signature approach for IoT motes. IACR ePrint Archive, Report 2019/122 (2019) Ghosh, S., Misoczki, R., Sastry, M.R.: Lightweight post-quantum-secure digital signature approach for IoT motes. IACR ePrint Archive, Report 2019/122 (2019)
10.
Zurück zum Zitat Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Symposium on the Theory of Computing (STOC), pp. 212–219. ACM (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Symposium on the Theory of Computing (STOC), pp. 212–219. ACM (1996)
11.
Zurück zum Zitat Higginbotham, S.: The rise of RISC - [opinion]. IEEE Spectr. 55(8), 18 (2018)CrossRef Higginbotham, S.: The rise of RISC - [opinion]. IEEE Spectr. 55(8), 18 (2018)CrossRef
15.
Zurück zum Zitat Hülsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle signature scheme. RFC 8391, 1–74 (2018) Hülsing, A., Butin, D., Gazdag, S., Rijneveld, J., Mohaisen, A.: XMSS: eXtended Merkle signature scheme. RFC 8391, 1–74 (2018)
17.
Zurück zum Zitat Kahri, F., Mestiri, H., Bouallegue, B., Machhout, M.: Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. In: Systems, Signals and Devices (SSD), pp. 1–5. IEEE (2015) Kahri, F., Mestiri, H., Bouallegue, B., Machhout, M.: Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. In: Systems, Signals and Devices (SSD), pp. 1–5. IEEE (2015)
18.
Zurück zum Zitat McGrew, D., Curcio, M., Fluhrer, S.: Hash-based signatures. cfrg draft-mcgrew-hash-sigs-1, pp. 1–60 (2018) McGrew, D., Curcio, M., Fluhrer, S.: Hash-based signatures. cfrg draft-mcgrew-hash-sigs-1, pp. 1–60 (2018)
21.
Zurück zum Zitat NIST: FIPS PUB 180–4: Secure Hash Standard. National Institute of Standards and Technology (2012) NIST: FIPS PUB 180–4: Secure Hash Standard. National Institute of Standards and Technology (2012)
22.
Zurück zum Zitat NIST: FIPS PUB 186–4: Digital Signature Standard. National Institute of Standards and Technology (2013) NIST: FIPS PUB 186–4: Digital Signature Standard. National Institute of Standards and Technology (2013)
23.
Zurück zum Zitat Padhi, M., Chaudhari, R.: An optimized pipelined architecture of SHA-256 hash function. In: Embedded Computing and System Design (ISED), pp. 1–4. IEEE (2017) Padhi, M., Chaudhari, R.: An optimized pipelined architecture of SHA-256 hash function. In: Embedded Computing and System Design (ISED), pp. 1–4. IEEE (2017)
24.
Zurück zum Zitat Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Foundations of Computer Science (FOCS), pp. 124–134. IEEE (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Foundations of Computer Science (FOCS), pp. 124–134. IEEE (1994)
25.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)MathSciNetCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)MathSciNetCrossRef
26.
Zurück zum Zitat Shoufan, A., Huber, N., Molter, H.G.: A novel cryptoprocessor architecture for chained Merkle signature scheme. Microprocess. Microsyst. 35(1), 34–47 (2011)CrossRef Shoufan, A., Huber, N., Molter, H.G.: A novel cryptoprocessor architecture for chained Merkle signature scheme. Microprocess. Microsyst. 35(1), 34–47 (2011)CrossRef
27.
Zurück zum Zitat Teich, J.: Hardware/software codesign: the past, the present, and predicting the future. Proc. IEEE 100, 1411–1430 (2012)CrossRef Teich, J.: Hardware/software codesign: the past, the present, and predicting the future. Proc. IEEE 100, 1411–1430 (2012)CrossRef
28.
Zurück zum Zitat Wang, W., et al.: XMSS and embedded systems – XMSS hardware accelerators for RISC-V. IACR ePrint Archive, Report 2018/1225 (2018) Wang, W., et al.: XMSS and embedded systems – XMSS hardware accelerators for RISC-V. IACR ePrint Archive, Report 2018/1225 (2018)
Metadaten
Titel
XMSS and Embedded Systems
verfasst von
Wen Wang
Bernhard Jungk
Julian Wälde
Shuwen Deng
Naina Gupta
Jakub Szefer
Ruben Niederhagen
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-38471-5_21