Hash-based cryptography: Difference between revisions

Content deleted Content added
Cdcdb (talk | contribs)
Cdcdb (talk | contribs)
No edit summary
Line 13:
 
Two [[Internet Research Task Force|IRTF]] [[Internet Draft]]s on stateful hash-based schemes (XMSS/XMSS<sup>''MT''</sup> and LMS) are currently active.<ref>{{cite web|last1=Hülsing|first1=Andreas|last2=Butin|first2=Denis|last3=Gazdag|first3=Stefan|last4=Mohaisen|first4=Aziz|title=draft-irtf-cfrg-xmss-hash-based-signatures-09 - XMSS: Extended Hash-Based Signatures|url=https://datatracker.ietf.org/doc/draft-irtf-cfrg-xmss-hash-based-signatures/|website=datatracker.ietf.org|publisher=IETF|language=en}}</ref><ref>{{cite web|last1=McGrew|first1=David|last2=Curcio|first2=Michael|last3=Fluhrer|first3=Scott|title=draft-mcgrew-hash-sigs-06 - Hash-Based Signatures|url=https://datatracker.ietf.org/doc/draft-mcgrew-hash-sigs/|website=datatracker.ietf.org|publisher=IETF|language=en}}</ref> Practical improvement have been proposed in the literature that alleviate the concerns introduced by stateful schemes.<ref>{{cite journal|last1=McGrew|first1=David|last2=Kampanakis|first2=Panos|last3=Fluhrer|first3=Scott|last4=Gazdag|first4=Stefan-Lukas|last5=Butin|first5=Denis|last6=Buchmann|first6=Johannes|title=State Management for Hash-Based Signatures|journal=Security Standardisation Research|date=2016|volume=10074|pages=244–260|doi=10.1007/978-3-319-49100-4_11|url=http://link.springer.com/chapter/10.1007/978-3-319-49100-4_11|publisher=Springer, Cham|language=en}}</ref> Hash functions appropriate for these schemes include [[SHA-2]], [[SHA-3]] and [[BLAKE (hash function)|BLAKE]]
 
==Implementations==
The XMSS, GMSS and SPHINCS schemes are available in the Java [[Bouncy Castle (cryptography)|Bouncy Castle]] cryptographic APIs.
 
==References==