Hi,
We appreciate that NIST prioritized standardization of SLH-DSA and that it will be published at the same time as ML-KEM and ML-DSA. If I remember correctly, NIST was previously planning to standardize SLH-DSA later together with NL-DSA.
While ML-DSA will likely be the default algorithm for most use cases, it is good to have the more conservative SLH-DSA standardized. For example, for software and firmware updates.
It would be interesting to hear NISTs and NSAs thoughts on hash-based signatures now that SLH-DSA has been prioritized up. Due to the current mandate in SP 800-208 to not allow the secret keying material to be exported, it is impossible to use LMS and XMSS in many use cases. Especially for firmware update.
Is NSA planning to include SLH-DSA in CNSA 2.0? If so, it would be good if NSA announced that as soon as possible before vendors starts implementing LMS or XMSS. It seems to me like the stateless SLH-DSA should be preferred over the stateful LMS and XMSS.
Cheers,
John Preuß Mattsson
Expert Cryptographic Algorithms and Security Protocols, Ericsson
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB9678A0FC5D7B44F88C4F182289F1A%40GVXPR07MB9678.eurprd07.prod.outlook.com.
Hello everyone,
There has been a lot of similar sentiments shared by
numerous companies and HSM vendors regarding the
difficulties associated with using stateful HBS schemes
given the constraints of SP800-208.
These concerns motivated a group of us to organize our
thoughts and arrange a meeting with NIST to see what could
be done to make SP800-208 more amenable to allow us to build
systems complying with the requirements and timelines of
CNSA 2.0. That meeting was held on August 14th in Maryland
at NIST's NCCoE facilities, and I've attached a copy of the
slide deck that was presented by the industry consortium.
NIST has taken those thoughts, and the feedback voiced
during the meeting, and is currently considering what, if
anything they can do, to address them. NIST plans to share
their thoughts on the matter at the upcoming ICMC in
Ottawa on Wednesday, September 20th @ 12:00 EDT in an
informal sidebar meeting that Crypto4A will be hosting at
the Shaw Centre where ICMC is being held. The meeting will
also be accessible via Webex for those who can’t attend in
person.
I’m the lucky guy handling the logistics so please feel free
to reach out to me directly (ji...@crypto4a.com) if you are
interested in attending either in person or remotely. We
have limited space in the room so it will be a first-come,
first-served sort of admittance. We plan to distribute the
Webex link to those who indicate they wish to attend
remotely.
Take care.
Jim
========================================================
Jim Goodman, Ph.D. (V) 1-613-454-2222
Crypto4a Inc. (C) 1-613-668-4894
1550A Laperriere Avenue
Ottawa, ON K1Z 7T2
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAPxHsSJG_zDst5GmVCniqA3jkbf6MqTCYv-zBXmTa81B33bEtQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/20230914161707.15102.qmail%40cr.yp.to.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/20230915013724.27510.qmail%40cr.yp.to.
Dear all,
if anyone is interested, we were faced with the problem of state management in constrained IoT devices using stateful HBS for device attestation and, as has been commented on this forum, we thought that SPHINCS+ was too heavy for certain devices. We finally came to the conclusion that it would be interesting to play with one-time HBS as well. A solution for this is suggested in:
Roberto Román, Rosario Arjona and Iluminada Baturone. "A lightweight remote attestation using PUFs and hash-based signatures for low-end IoT devices". Future Generation Computer Systems (2023). https://doi.org/10.1016/j.future.2023.06.008
Our solution includes the use of a Physically Unclonable Function (PUF) as well.
Best regards,
Iluminada.