Skip to content

Commit

Permalink
Update draft-irtf-cfrg-det-sigs-with-noise.md
Browse files Browse the repository at this point in the history
  • Loading branch information
emanjon authored Feb 28, 2024
1 parent 984bd61 commit b36882a
Showing 1 changed file with 0 additions and 12 deletions.
12 changes: 0 additions & 12 deletions draft-irtf-cfrg-det-sigs-with-noise.md
Original file line number Diff line number Diff line change
Expand Up @@ -515,18 +515,6 @@ With the construction in this document, the repetition of the same per-message s

Implementations need to follow best practices on how to protect against all side-channel attacks, not just attacks that exploit determinism, see for example {{BSI}}.

# For discussion (to be removed in the future)

* Ordering of the parameters in "dom2(F, C) \|\| Z \|\| prefix \|\| 000... \|\| PH(M)" in Ed25519 and similar in Ed448 and ECDSA. There has also been sugestion to use a larger Z and to use several paddings 000....

* Ilari Liusvaara pointed out attacks using the context that needs to be considered. Some statements "first block is composed only of the hashed private key and the random value" in the document are not true for Ed25519ctx and Ed448ctx.

* Jim Schaad: Is there any advantage to stealing one of the zeros from the end padding and using it to pad between 'Z' and 'x' in the construction? I would assume that it should use the '0'/'1' construction between steps d and f.

* Jim Schaad: Is there any advantage to padding with 0x01 in step f rather than 0x00?

* Rene Stuik: MUST instead of RECOMMENDED.

--- back

# Change log
Expand Down

0 comments on commit b36882a

Please sign in to comment.