Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SPHINCS+ update as per FIPS 205 initial draft #56

Closed
blakehartin opened this issue Nov 19, 2023 · 1 comment
Closed

SPHINCS+ update as per FIPS 205 initial draft #56

blakehartin opened this issue Nov 19, 2023 · 1 comment

Comments

@blakehartin
Copy link

As per NIST publication, following changes are proposed to SPHINCS+ in SLH-DSA

Would be nice if these changes can be incorporated. Thanks in advance!

https://csrc.nist.gov/pubs/fips/205/ipd

• Two new address types were defned, WOTS_PRF and FORS_PRF, which are used for WOTS+
and FORS secret key value generation.
• PK.seed was added as an input to PRF in order to mitigate multi-key attacks.
• For the category 3 and 5 parameter sets that use SHA-2, SHA-256 was replaced with
SHA-512 in Hmsg, PRFmsg, H, and Tl based on weaknesses that were discovered when
using SHA-256 to obtain category 5 security [6, 7, 8].
• R and PK.seed were added as inputs to MGF1 when computing Hmsg for the SHA-2
parameter sets in order to mitigate against multi-target long-message second preimage
attacks.

@bwesterb
Copy link
Contributor

SLH-DSA is not final yet. We'll adopt once they are. Current changes are in this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants