Message index aware multi-hash accelerator for post quantum cryptography secure hash-based signing and verification
First Claim
Patent Images
1. An apparatus, comprising:
- a computer readable memory;
at least one of;
a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, ora verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; and
an accelerator logic to;
apply a structured order to at least one set of inputs to the hash-based signature scheme;
divide the signature into a plurality of signature components;
apply a secure hash algorithm (SHA) to the plurality of signature components;
identify a hash chain message length for each signature component in the plurality of signature components; and
sort the plurality of signature components into an indexed hash chain list according to the respective hash chain message length of each signature component in the plurality of signature components.
1 Assignment
0 Petitions
Accused Products
Abstract
In one example an apparatus comprises a computer readable memory, a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or a verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key, and an accelerator logic to apply a structured order to at least one set of inputs to the hash-based signature scheme. Other examples may be described.
15 Citations
15 Claims
-
1. An apparatus, comprising:
-
a computer readable memory; at least one of; a signature logic to generate a signature to be transmitted in association with a message, the signature logic to apply a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or a verification logic to verify a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; and an accelerator logic to; apply a structured order to at least one set of inputs to the hash-based signature scheme; divide the signature into a plurality of signature components; apply a secure hash algorithm (SHA) to the plurality of signature components; identify a hash chain message length for each signature component in the plurality of signature components; and sort the plurality of signature components into an indexed hash chain list according to the respective hash chain message length of each signature component in the plurality of signature components. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method, comprising:
-
performing at least one of; generating a signature to be transmitted in association with a message by applying a hash-based signature scheme to the message using a private key to generate the signature comprising a public key, or verifying a signature received in association with the message, the verification logic to apply the hash-based signature scheme to verify the signature using the public key; applying a structured order to at least one set of inputs to the hash-based signature scheme; dividing the signature into a plurality of signature components; and applying a secure hash algorithm (SHA) to the plurality of signature components; identifying a hash chain message length for each signature component in the plurality of signature components; and sorting the plurality of signature components into an indexed hash chain list according to the respective hash chain message length of each signature component in the plurality of signature components. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium comprising instructions which, when executed by a processor, configure the processor to perform operations, comprising:
-
applying a hash-based signature scheme to perform at least one of; generating a signature using a private key, the signature to be transmitted in association with a message comprising a public key, or verifying the signature received in association with the message using the public key; applying a structured order to at least one set of inputs to the hash-based signature scheme; dividing the signature into a plurality of signature components; and applying a secure hash algorithm (SHA) to the plurality of signature components; identifying a hash chain message length for each signature component in the plurality of signature components; and sorting the plurality of signature components into an indexed hash chain list according to the respective hash chain message length of each signature component in the plurality of signature components. - View Dependent Claims (12, 13, 14, 15)
-
Specification