SPHINCS^+ digital signature scheme with GOST hash functions

04/13/2019
by   E. O. Kiktenko, et al.
0

Many commonly used public key cryptosystems will become insecure once a scalable quantum computer is built. New cryptographic schemes that can guarantee protection against attacks with quantum computers, so-called post-quantum algorithms, have emerged in recent decades. One of the most promising candidates for a post-quantum signature scheme is SPHINCS^+, which is based on cryptographic hash functions. In this contribution, we analyze the use of the new Russian standardized hash function, known as Streebog, for the implementation of the SPHINCS^+ signature scheme. We provide a performance comparison with SHA-256-based instantiation and give benchmarks for various sets of parameters.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/12/2023

Protecting Quantum Procrastinators with Signature Lifting: A Case Study in Cryptocurrencies

Current solutions to quantum vulnerabilities of widely used cryptographi...
research
07/16/2018

Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

In this paper we consider a post-quantum digital signature scheme based ...
research
10/13/2020

PQFabric: A Permissioned Blockchain Secure from Both Classical and Quantum Attacks

Hyperledger Fabric is a prominent and flexible solution for building per...
research
09/17/2019

Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography

An ideal signature material and method, which can be used to prove the a...
research
06/26/2023

Performance Analysis and Evaluation of Post Quantum Secure Blockchained Federated Learning

Post-quantum security is critical in the quantum era. Quantum computers,...
research
03/13/2022

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

NIST is standardizing Post Quantum Cryptography (PQC) algorithms that ar...
research
02/14/2018

Zero-Knowledge Password Policy Check from Lattices

Passwords are ubiquitous and most commonly used to authenticate users wh...

Please sign up or login with your details

Forgot password? Click here to reset