Re: [Suit] PQM signature algorithm ROM requirements

Brendan Moran <Brendan.Moran@arm.com> Mon, 28 March 2022 11:03 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8029B3A1188 for <suit@ietfa.amsl.com>; Mon, 28 Mar 2022 04:03:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=3hXLKCLq; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=3hXLKCLq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v7Xoha5efbm5 for <suit@ietfa.amsl.com>; Mon, 28 Mar 2022 04:03:20 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-am5eur03on061b.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe08::61b]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 520EC3A1187 for <suit@ietf.org>; Mon, 28 Mar 2022 04:03:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=98dN9+z5xaxbcz89pHuCkXvjhHRjbHY9JjEzu85xaxU=; b=3hXLKCLqe+vaHrGKrUwolIJz1D5eBrUk+zfmJ+1MYiFjzWCMpUH+wwjuMuPOxE58JHKmw0VWL67IJ2FsKcg49Vz/rpTGswKHSI4CCv6qRaw3+meTK6Fz7zffLBCn6F60EAiVip6by+EUiAQ88e9oUeSOzVZwXJAlxXFVeuNJzQU=
Received: from AM6PR02CA0008.eurprd02.prod.outlook.com (2603:10a6:20b:6e::21) by AS1PR08MB7660.eurprd08.prod.outlook.com (2603:10a6:20b:47b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.22; Mon, 28 Mar 2022 11:03:13 +0000
Received: from VE1EUR03FT046.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:6e:cafe::e8) by AM6PR02CA0008.outlook.office365.com (2603:10a6:20b:6e::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.17 via Frontend Transport; Mon, 28 Mar 2022 11:03:13 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT046.mail.protection.outlook.com (10.152.19.226) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.18 via Frontend Transport; Mon, 28 Mar 2022 11:03:13 +0000
Received: ("Tessian outbound 341d209a0e52:v113"); Mon, 28 Mar 2022 11:03:12 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 3c3f99e55e322169
X-CR-MTA-TID: 64aa7808
Received: from 705b2838cd35.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 485DF0C2-F2AB-4615-BDC8-A5066FD7043C.1; Mon, 28 Mar 2022 11:03:05 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 705b2838cd35.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 28 Mar 2022 11:03:05 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QcJTZkaR5d65X6R+h92QqOZymLvekbUijM4kxkY1DvOlGuldwAaRyjkeznipvuwxYlqz8ZR/UZLjVeuNTP6JfHB910dqVoC6hmIMv+OK16cQnhI1WllKc70fCmACewzrDFt6TvH3tuY8Z+4CUmBNy/eB8sPh3Z2xgYNNOm5CFEFY0wUn+Aj74yg1OCyZgKfekJxhONNKLtxrzbqIzhSZ95079LfKXO3d2iwFhGosytU6rtHlzCOO6QPtY3xomsm1CzXsnupTD7NdqfAOQlBi3zztddYhxuWwNMZZN5F2o22y2OJZbCDcq7eCDNK/cpwH71bvYfzaJBxv/FsvpBsnQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=98dN9+z5xaxbcz89pHuCkXvjhHRjbHY9JjEzu85xaxU=; b=bibkv3tX4ViCk/tLCqQGISgid4nQLw3Wqluxk6Afby/e+kKEbDpKLP68V/NUttFRa5bDXda93So8vlfu/Y2/GSWDChtvlisC3uLy6i4FJh7vpd/D97e1L6f6JWjDQ4z3BezHL/+rsPTQEq3BFM/JfCheBWrKZUlmRDJ2tqMGYm4zTlXAwxqCJPtLLClVemKhAraKcmEREz9WsANfvinLGiaDvERC6KOhm4mWO2tKLNtk6jSTj8G/BiaDGCud8RipgaYc3PUKmrYdaqUgOQQbSESAl2ln7grGgD4wp1ZejXcNp/GnEy7cG2M5j2hfpLFRYBXUfEdfLy9WWLv3Dzv22g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=98dN9+z5xaxbcz89pHuCkXvjhHRjbHY9JjEzu85xaxU=; b=3hXLKCLqe+vaHrGKrUwolIJz1D5eBrUk+zfmJ+1MYiFjzWCMpUH+wwjuMuPOxE58JHKmw0VWL67IJ2FsKcg49Vz/rpTGswKHSI4CCv6qRaw3+meTK6Fz7zffLBCn6F60EAiVip6by+EUiAQ88e9oUeSOzVZwXJAlxXFVeuNJzQU=
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by VE1PR08MB5104.eurprd08.prod.outlook.com (2603:10a6:803:114::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.21; Mon, 28 Mar 2022 11:03:00 +0000
Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::cd42:90e:6b8:dc77]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::cd42:90e:6b8:dc77%3]) with mapi id 15.20.5102.022; Mon, 28 Mar 2022 11:02:59 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: David Brown <david.brown@linaro.org>
CC: Koen Zandberg <koen.zandberg@inria.fr>, suit <suit@ietf.org>, Russ Housley <housley@vigilsec.com>
Thread-Topic: [Suit] PQM signature algorithm ROM requirements
Thread-Index: AQHYP39uFUQ+vWyUsE27ptvflRA0J6zOr9iAgAX37QA=
Date: Mon, 28 Mar 2022 11:02:59 +0000
Message-ID: <9B0FD5BC-5057-453D-AE27-3459A1978108@arm.com>
References: <866527de-88ed-882a-97d4-a3dc4b6d252a@inria.fr> <01448EED-895A-4689-B0D1-73EEEC089A26@vigilsec.com>
In-Reply-To: <01448EED-895A-4689-B0D1-73EEEC089A26@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.120.0.1.13)
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 2675ba16-299f-447c-7381-08da10aa8d9a
x-ms-traffictypediagnostic: VE1PR08MB5104:EE_|VE1EUR03FT046:EE_|AS1PR08MB7660:EE_
X-Microsoft-Antispam-PRVS: <AS1PR08MB7660452D9D1834B790C78246EA1D9@AS1PR08MB7660.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(966005)(2616005)(71200400001)(76116006)(4326008)(6916009)(316002)(6506007)(8676002)(66476007)(508600001)(54906003)(36756003)(91956017)(64756008)(66556008)(66446008)(186003)(5660300002)(83380400001)(2906002)(6486002)(26005)(8936002)(6512007)(86362001)(66946007)(33656002)(38070700005)(55236004)(38100700002)(53546011)(122000001)(45980500001); DIR:OUT; SFP:1101;
Content-Type: text/plain; charset="utf-8"
Content-ID: <B2B0490A145E4C45B3C7379FBC85A4FC@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5104
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: fd3e21c5-a4f2-41e6-cd9b-08da10aa8553
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(36840700001)(40470700004)(46966006)(5660300002)(6512007)(336012)(83380400001)(8676002)(70206006)(2616005)(86362001)(40460700003)(54906003)(316002)(107886003)(508600001)(6486002)(8936002)(26005)(82310400004)(36756003)(966005)(356005)(81166007)(2906002)(53546011)(33656002)(186003)(6506007)(4326008)(6862004)(36860700001)(70586007)(47076005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Mar 2022 11:03:13.1487 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2675ba16-299f-447c-7381-08da10aa8d9a
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT046.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS1PR08MB7660
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/447Gg43c_x9CUmYk6qY4CRTX0Co>
Subject: Re: [Suit] PQM signature algorithm ROM requirements
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 28 Mar 2022 11:03:26 -0000

Hi David,

You had expressed some concern about the size of Falcon during the meeting. Do you think that 10kB for the algorithm is more plausible?

Naturally, we will need to see what NIST picks, but the performance and size of Falcon are quite appealing for an infinite signature scheme.

It may be that there are better options for the Falcon implementation as well. Pqm4 has some interesting benchmarks: https://github.com/mupq/pqm4/blob/master/benchmarks.md

In particular, I’m keen to understand what’s meant by Falcon using 388 bytes of RAM: https://github.com/mupq/pqm4/blob/master/benchmarks.md#signature-schemes-1

Unfortunately, that benchmark table does not have entries for verify-only code size.

Best Regards,
Brendan


> On 24 Mar 2022, at 15:54, Russ Housley <housley@vigilsec.com> wrote:
>
> Koen:
>
> Thanks for doing the work.  For HSS-LMS I expected the vast bull of the size to come from the SHA-256 part of the implementation, and this small code size aligns with that expectation.
>
> Russ
>
>
>> On Mar 24, 2022, at 9:01 AM, Koen Zandberg <koen.zandberg@inria.fr> wrote:
>>
>> Hi all,
>>
>> During the discussion of the draft-ietf-suit-manifest document and the MTI part there was some discussion on PQM algorithms implementation sizes[1]. One question that was  raised was whether the ROM requirements on the algorithms in question (HSS-LMS and Falcon) is verification only, or includes the signing code. The short answer here is that the numbers in table 5 include the signing code. Based on our measurements with the same code base and on the same hardware, for HSS-LMS, a verification only build needs 2864 bytes for the HSS-LMS code. For Falcon it is 10112 bytes for verification only. (gcc 10.3.1 with -Os)
>>
>> The HSS-LMS implementation used is the hash-sigs repo [2] from Cisco. The Falcon implementation used is based on the reference implementation [3]. The code to get these numbers is of course available online [4][5].
>>
>> Best regards,
>> Koen Zandberg
>>
>> [1]: Article to appear in ACNS 2022. Preprint: https://eprint.iacr.org/2021/781.pdf
>> [2]: https://github.com/cisco/hash-sigs
>> [3]: https://falcon-sign.info/
>> [4]: https://github.com/future-proof-iot/RIOT/tree/postquantum_crypto/tests/bench_hash-sigs
>> [5]: https://github.com/future-proof-iot/RIOT/tree/postquantum_crypto/pkg/falcon_sig
>
> _______________________________________________
> Suit mailing list
> Suit@ietf.org
> https://www.ietf.org/mailman/listinfo/suit

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.