Abstract
While research in post-quantum cryptography (PQC) has gained significant momentum, it is only slowly adopted for real-world products. This is largely due to concerns about practicability and maturity. The secure boot process of embedded devices is one scenario where such restraints can result in fundamental security problems. In this work, we present a flexible hardware/software co-design for hash-based signature (HBS) schemes which enables the move to a post-quantum secure boot today. These signature schemes stand out due to their straightforward security proofs and are on the fast track to standardisation. In contrast to previous works, we exploit the performance intensive similarities of the stateful LMS and XMSS schemes as well as the stateless SPHINCS+ scheme. Thus, we enable designers to use a stateful or stateless scheme depending on the constraints of each individual application. To show the feasibility of our approach, we compare our results with hardware accelerated implementations of classical asymmetric algorithms. Further, we lay out the usage of different HBS schemes during the boot process. We compare different schemes, show the importance of parameter choices, and demonstrate the performance gain with different levels of hardware acceleration.
Author supplied keywords
Cite
CITATION STYLE
Wagner, A., Oberhansl, F., & Schink, M. (2022). To Be, or Not to Be Stateful: Post-Quantum Secure Boot using Hash-Based Signatures. In ASHES 2022 - Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2022 (pp. 85–94). Association for Computing Machinery, Inc. https://doi.org/10.1145/3560834.3563831
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.