Cargando…

K-XMSS and K-SPHINCS(+): Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms

As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet systems are actively being conducted. Hash-Based Sign...

Descripción completa

Detalles Bibliográficos
Autores principales: Sim, Minjoo, Eum, Siwoo, Song, Gyeongju, Yang, Yujin, Kim, Wonwoong, Seo, Hwajeong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10490732/
https://www.ncbi.nlm.nih.gov/pubmed/37688014
http://dx.doi.org/10.3390/s23177558
Descripción
Sumario:As Mobile Communication and Internet Systems (MCIS) have rapidly developed, security issues related to MCIS have become increasingly important. Therefore, the development and research of security technologies for mobile communication and internet systems are actively being conducted. Hash-Based Signature (HBS) uses a hash function to construct a digital signature scheme, where its security is guaranteed by the collision resistance of the hash function used. To provide sufficient security in the post-quantum environment, the length of hash should be satisfied for the security requirement. Modern HBS can be classified into stateful and stateless schemes. Two representative stateful and stateless HBS are eXtended Merkle Signature Scheme(XMSS) and SPHINCS [Formula: see text] , respectively. In this paper, we propose two HBS schemes: K-XMSS and K-SPHINCS [Formula: see text] , which replace internal hash functions of XMSS and SPHINCS [Formula: see text] with Korean cryptography algorithms. K-XMSS is a stateful signature, while K-SPHINCS [Formula: see text] is its stateless counterpart. We showcase the reference implementation of K-XMSS and K-SPHINCS [Formula: see text] employing Lightweight Secure Hash (LSH) and two hash functions based on block ciphers (i.e., CHAM and LEA) as the internal hash function. In addition, K-XMSS and K-SPHINCS [Formula: see text] using Advanced Vector Extensions 2 (AVX2) have been provided, demonstrating that they can be optimized for better performance using advanced implementation techniques than previous approaches.