The Cracking of <i>WalnutDSA</i>: A Survey
This paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction,...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-08-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/11/9/1072 |
id |
doaj-90eb7d59995b40b89d4843dce46994ae |
---|---|
record_format |
Article |
spelling |
doaj-90eb7d59995b40b89d4843dce46994ae2020-11-25T02:23:45ZengMDPI AGSymmetry2073-89942019-08-01119107210.3390/sym11091072sym11091072The Cracking of <i>WalnutDSA</i>: A SurveyJosé Ignacio Escribano Pablos0María Isabel González Vasco1Misael Enrique Marriaga2Ángel Luis Pérez del Pozo3MACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainMACIMTE, U. Rey Juan Carlos, 28933 Móstoles, SpainThis paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction, the security of which relies on the hardness of certain problems related to an action of a braid group on a finite set. In spite of originally resisting the typical attacks succeeding against this kind of construction, soon different loopholes were identified rendering the proposal insecure (and finally, resulting in it being excluded from Round 2 of the NIST competition). Some of these attacks are related to the well-structured and symmetric masking of certain secret elements during the signing process. We explain the design principles behind this proposal and survey the main attack strategies that have succeeded, contradicting its claimed security properties, as well as the recently-proposed ideas aimed at overcoming these issues.https://www.mdpi.com/2073-8994/11/9/1072<i>WalnutDSA</i>digital signaturespost-quantum cryptographycryptanalysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
José Ignacio Escribano Pablos María Isabel González Vasco Misael Enrique Marriaga Ángel Luis Pérez del Pozo |
spellingShingle |
José Ignacio Escribano Pablos María Isabel González Vasco Misael Enrique Marriaga Ángel Luis Pérez del Pozo The Cracking of <i>WalnutDSA</i>: A Survey Symmetry <i>WalnutDSA</i> digital signatures post-quantum cryptography cryptanalysis |
author_facet |
José Ignacio Escribano Pablos María Isabel González Vasco Misael Enrique Marriaga Ángel Luis Pérez del Pozo |
author_sort |
José Ignacio Escribano Pablos |
title |
The Cracking of <i>WalnutDSA</i>: A Survey |
title_short |
The Cracking of <i>WalnutDSA</i>: A Survey |
title_full |
The Cracking of <i>WalnutDSA</i>: A Survey |
title_fullStr |
The Cracking of <i>WalnutDSA</i>: A Survey |
title_full_unstemmed |
The Cracking of <i>WalnutDSA</i>: A Survey |
title_sort |
cracking of <i>walnutdsa</i>: a survey |
publisher |
MDPI AG |
series |
Symmetry |
issn |
2073-8994 |
publishDate |
2019-08-01 |
description |
This paper reports on the Walnut Digital Signature Algorithm (<i>WalnutDSA</i>), which is an asymmetric signature scheme recently presented for standardization at the NIST call for post-quantum cryptographic constructions. <i>WalnutDSA</i> is a group theoretical construction, the security of which relies on the hardness of certain problems related to an action of a braid group on a finite set. In spite of originally resisting the typical attacks succeeding against this kind of construction, soon different loopholes were identified rendering the proposal insecure (and finally, resulting in it being excluded from Round 2 of the NIST competition). Some of these attacks are related to the well-structured and symmetric masking of certain secret elements during the signing process. We explain the design principles behind this proposal and survey the main attack strategies that have succeeded, contradicting its claimed security properties, as well as the recently-proposed ideas aimed at overcoming these issues. |
topic |
<i>WalnutDSA</i> digital signatures post-quantum cryptography cryptanalysis |
url |
https://www.mdpi.com/2073-8994/11/9/1072 |
work_keys_str_mv |
AT joseignacioescribanopablos thecrackingofiwalnutdsaiasurvey AT mariaisabelgonzalezvasco thecrackingofiwalnutdsaiasurvey AT misaelenriquemarriaga thecrackingofiwalnutdsaiasurvey AT angelluisperezdelpozo thecrackingofiwalnutdsaiasurvey AT joseignacioescribanopablos crackingofiwalnutdsaiasurvey AT mariaisabelgonzalezvasco crackingofiwalnutdsaiasurvey AT misaelenriquemarriaga crackingofiwalnutdsaiasurvey AT angelluisperezdelpozo crackingofiwalnutdsaiasurvey |
_version_ |
1724857399382114304 |