The Cracking of <i>WalnutDSA</i>: A Survey

This paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction,...

Full description

Bibliographic Details
Main Authors: José Ignacio Escribano Pablos, María Isabel González Vasco, Misael Enrique Marriaga, Ángel Luis Pérez del Pozo
Format: Article
Language:English
Published: MDPI AG 2019-08-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/11/9/1072
id doaj-90eb7d59995b40b89d4843dce46994ae
record_format Article
spelling doaj-90eb7d59995b40b89d4843dce46994ae2020-11-25T02:23:45ZengMDPI AGSymmetry2073-89942019-08-01119107210.3390/sym11091072sym11091072The Cracking of <i>WalnutDSA</i>: A SurveyJosé Ignacio Escribano Pablos0María Isabel González Vasco1Misael Enrique Marriaga2Ángel Luis Pérez del Pozo3MACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainThis paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction, the security of which relies on the hardness of certain problems related to an action of a braid group on a finite set. In spite of originally resisting the typical attacks succeeding against this kind of construction, soon different loopholes were identified rendering the proposal insecure (and finally, resulting in it being excluded from Round 2 of the NIST competition). Some of these attacks are related to the well-structured and symmetric masking of certain secret elements during the signing process. We explain the design principles behind this proposal and survey the main attack strategies that have succeeded, contradicting its claimed security properties, as well as the recently-proposed ideas aimed at overcoming these issues.https://www.mdpi.com/2073-8994/11/9/1072<i>WalnutDSA</i>digital signaturespost-quantum cryptographycryptanalysis
collection DOAJ
language English
format Article
sources DOAJ
author José Ignacio Escribano Pablos
María Isabel González Vasco
Misael Enrique Marriaga
Ángel Luis Pérez del Pozo
spellingShingle José Ignacio Escribano Pablos
María Isabel González Vasco
Misael Enrique Marriaga
Ángel Luis Pérez del Pozo
The Cracking of <i>WalnutDSA</i>: A Survey
Symmetry
<i>WalnutDSA</i>
digital signatures
post-quantum cryptography
cryptanalysis
author_facet José Ignacio Escribano Pablos
María Isabel González Vasco
Misael Enrique Marriaga
Ángel Luis Pérez del Pozo
author_sort José Ignacio Escribano Pablos
title The Cracking of <i>WalnutDSA</i>: A Survey
title_short The Cracking of <i>WalnutDSA</i>: A Survey
title_full The Cracking of <i>WalnutDSA</i>: A Survey
title_fullStr The Cracking of <i>WalnutDSA</i>: A Survey
title_full_unstemmed The Cracking of <i>WalnutDSA</i>: A Survey
title_sort cracking of <i>walnutdsa</i>: a survey
publisher MDPI AG
series Symmetry
issn 2073-8994
publishDate 2019-08-01
description This paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction, the security of which relies on the hardness of certain problems related to an action of a braid group on a finite set. In spite of originally resisting the typical attacks succeeding against this kind of construction, soon different loopholes were identified rendering the proposal insecure (and finally, resulting in it being excluded from Round 2 of the NIST competition). Some of these attacks are related to the well-structured and symmetric masking of certain secret elements during the signing process. We explain the design principles behind this proposal and survey the main attack strategies that have succeeded, contradicting its claimed security properties, as well as the recently-proposed ideas aimed at overcoming these issues.
topic <i>WalnutDSA</i>
digital signatures
post-quantum cryptography
cryptanalysis
url https://www.mdpi.com/2073-8994/11/9/1072
work_keys_str_mv AT joseignacioescribanopablos thecrackingofiwalnutdsaiasurvey
AT mariaisabelgonzalezvasco thecrackingofiwalnutdsaiasurvey
AT misaelenriquemarriaga thecrackingofiwalnutdsaiasurvey
AT angelluisperezdelpozo thecrackingofiwalnutdsaiasurvey
AT joseignacioescribanopablos crackingofiwalnutdsaiasurvey
AT mariaisabelgonzalezvasco crackingofiwalnutdsaiasurvey
AT misaelenriquemarriaga crackingofiwalnutdsaiasurvey
AT angelluisperezdelpozo crackingofiwalnutdsaiasurvey
_version_ 1724857399382114304