Hash-based signature (HBS) schemes are an efficient method
of guaranteeing the authenticity of data in a post-quantum world. The
stateful schemes LMS and XMSS and the stateless scheme SPHINCS+
are already standardised or will be in the near future. The Winternitz
one-time signature (WOTS) scheme is one of the fundamental building
blocks used in all these HBS standardisation proposals.We present a new
fault injection attack targeting WOTS that allows an adversary to forge
signatures for arbitrary messages. The attack affects both the signing
and verification processes of all current stateful and stateless schemes.
Our attack renders the checksum calculation within WOTS useless. A
successful fault injection allows at least an existential forgery attack and,
in more advanced settings, a universal forgery attack. While checksum
computation is clearly a critical point in WOTS, and thus in any of
the relevant HBS schemes, its resilience against a fault attack has never
been considered. To fill this gap, we theoretically explain the attack, estimate its practicability, and derive the brute-force complexity to achieve
signature forgery for a variety of parameter sets. We analyse the reference implementations of LMS, XMSS and SPHINCS+ and pinpoint the
vulnerable points. To harden these implementations, we propose countermeasures and evaluate their effectiveness and efficiency. Our work shows that exposed devices running signature generation or verification with any of these three schemes must have countermeasures in place.
«