Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+

被引:3
作者
Barbosa, Manuel [1 ,2 ]
Dupressoir, Francois [3 ]
Gregoire, Benjamin [4 ]
Hulsing, Andreas [5 ]
Meijers, Matthias [5 ]
Strub, Pierre-Yves [6 ]
机构
[1] Univ Porto FCUP, Porto, Portugal
[2] INESC TEC, Porto, Portugal
[3] Univ Bristol, Bristol, Avon, England
[4] Univ Cote dAzur, INRIA, Sophia Antipolis, France
[5] Eindhoven Univ Technol, Eindhoven, Netherlands
[6] Meta, Paris, France
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V | 2023年 / 14085卷
关键词
XMSS; SPHINCS+; EasyCrypt; Formal Verification; Machine-Checked Proofs; Computer-Aided Cryptography;
D O I
10.1007/978-3-031-38554-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a novel machine-checked tight security proof for XMSS-a stateful hash-based signature scheme that is (1) standardized in RFC 8391 and NIST SP 800-208, and (2) employed as a primary building block of SPHINCS+, one of the signature schemes recently selected for standardization as a result of NIST's post-quantum competition. In 2020, Kudinov, Kiktenko, and Fedoro pointed out a flaw affecting the tight security proofs of SPHINCS+ and XMSS. For the case of SPHINCS+, this flaw was fixed in a subsequent tight security proof by Hulsing and Kudinov. Unfortunately, employing the fix from this proof to construct an analogous tight security proof for XMSS would merely demonstrate security with respect to an insufficient notion. At the cost of modeling the message-hashing function as a random oracle, we complete the tight security proof for XMSS and formally verify it using the EasyCrypt proof assistant. (Note that this merely extends the use of the random oracle model, as this model is already required in other parts of the security analysis to justify the currently standardized parameter values). As part of this endeavor, we formally verify the crucial step common to the security proofs of SPHINCS+ and XMSS that was found to be flawed before, thereby confirming that the core of the aforementioned security proof by Hulsing and Kudinov is correct. As this is the first work to formally verify proofs for hash-based signature schemes in EasyCrypt, we develop several novel libraries for the fundamental cryptographic concepts underlying such schemes-e.g., hash functions and digital signature schemes-establishing a common starting point for future formal verification efforts. These libraries will be particularly helpful in formally verifying proofs of other hash-based signature schemes such as LMS or SPHINCS+.
引用
收藏
页码:421 / 454
页数:34
相关论文
共 23 条
[1]   Machine-Checked Proofs for Cryptographic Standards Indifferentiability of SPONGE and Secure High-Assurance Implementations of SHA-3 [J].
Almeida, Jose Bacelar ;
Baritel-Ruet, Cecile ;
Barbosa, Manuel ;
Barthe, Gilles ;
Dupressoir, Francois ;
Gregoire, Benjamin ;
Laporte, Vincent ;
Oliveira, Tiago ;
Stoughton, Alley ;
Strub, Pierre-Yves .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1607-1622
[2]   EasyPQC: Verifying Post-Quantum Cryptography [J].
Barbosa, Manuel ;
Barthe, Gilles ;
Fan, Xiong ;
Gregoire, Benjamin ;
Hung, Shih-Han ;
Katz, Jonathan ;
Strub, Pierre-Yves ;
Wu, Xiaodi ;
Zhou, Li .
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, :2564-2586
[3]   SoK: Computer-Aided Cryptography [J].
Barbosa, Manuel ;
Barthe, Gilles ;
Bhargavan, Karthik ;
Blanchet, Bruno ;
Cremers, Cas ;
Liao, Kevin ;
Parno, Bryan .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :777-795
[4]  
Barthe Gilles, 2012, Interactive Theorem Proving. Proceedings of the Third International Conference, ITP 2012, P11, DOI 10.1007/978-3-642-32347-8_2
[5]  
Barthe G, 2011, LECT NOTES COMPUT SC, V6558, P180, DOI 10.1007/978-3-642-19074-2_13
[6]   The SPHINCS+ Signature Framework [J].
Bernstein, Daniel J. ;
Huelsing, Andreas ;
Koelbl, Stefan ;
Niederhagen, Ruben ;
Rijneveld, Joost ;
Schwabe, Peter .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :2129-2146
[7]  
Bos JW, 2020, IACR Transactions on Cryptographic Hardware and Embedded Systems, P137, DOI [10.46586/tches.v2021.i1.137-168, 10.46586/tches.v2021.i1.137-168, DOI 10.46586/TCHES.V2021.I1.137-168]
[8]  
Cooper D. A., 2020, Recommendation for stateful hashbased signature schemes, 2020-10-29 00:10:00 2020, V800-208
[9]   A Comprehensive Symbolic Analysis of TLS 1.3 [J].
Cremers, Cas ;
Horvat, Marko ;
Hoyland, Jonathan ;
Scott, Sam ;
van der Merwe, Thyla .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1773-1788
[10]   Tight Adaptive Reprogramming in the QROM [J].
Grilo, Alex B. ;
Hovelmanns, Kathrin ;
Hulsing, Andreas ;
Majenz, Christian .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 :637-667