266
Views
1
CrossRef citations to date
0
Altmetric
Mathematics of Cryptography and Coding in the Quantum Era

WalnutDSA™: a group theoretic digital signature algorithm

, ORCID Icon, &
Pages 260-284 | Received 26 Jun 2020, Accepted 13 Sep 2020, Published online: 02 Nov 2020
 

ABSTRACT

This paper presents an in depth discussion of WalnutDSA, a quantum resistant public-key digital signature method based on the one-way function E-multiplication. A key feature of WalnutDSA is that it provides very efficient means of validating digital signatures which is essential for low-powered and constrained devices. This paper presents an in-depth discussion of the construction of the digital signature algorithm, and delves deeply into the underlying mathematics that facilitates analysing the security of the scheme. When implemented using parameters that defeat all known attacks, WalnutDSA is among the fastest quantum resistant signature verification methods; it performs orders of magnitude faster than ECC, even on low-end embedded hardware. WalnutDSA delivers a 12–25× speed improvement over ECDSA on most platforms, and a 31× speed improvement on a 16-bit microcontroller, making it an ideal solution for low-resource processors found in the Internet of Things (IoT).

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1 For a weak hash H1 and a strong hash H2, which has twice the output size of H1, an attacker would need to find two messages m and m that are preimages to the halves of H2 of the desired forgery and then get the signer to use H1 and sign both m and m. For example, the attacker would need to take his or her desired forged message, hash it using SHA2-256, find two preimages with MD5, get the signer to sign those MD5 preimages, and only then can he or she compose a message that would verify with SHA2-256.

2 In practice 128-bit signatures average around 211 generators, but different rewriting techniques could extend that. Because the braid group is infinite there are many ways to represent the same signature, however all those ways are well beyond the 214 limit.

3 We also think this explains why the Kotov–Menshov–Ushakov attack was as successful as it was.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 513.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.