[CFRG] [Errata Rejected] RFC7748 (5651)

RFC Errata System <rfc-editor@rfc-editor.org> Tue, 15 December 2020 07:06 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B4293A0B38; Mon, 14 Dec 2020 23:06:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level:
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LbFueOZ7cwpn; Mon, 14 Dec 2020 23:06:36 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4053A3A0B36; Mon, 14 Dec 2020 23:06:36 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 9589EF4071F; Mon, 14 Dec 2020 23:06:31 -0800 (PST)
To: boutoukoat@yahoo.fr, agl@google.com, mike@shiftleft.org, sean@sn3rd.com
X-PHP-Originating-Script: 30:errata_mail_lib.php
From: RFC Errata System <rfc-editor@rfc-editor.org>
Cc: smyshsv@gmail.com, irsg@irtf.org, cfrg@irtf.org, rfc-editor@rfc-editor.org
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20201215070631.9589EF4071F@rfc-editor.org>
Date: Mon, 14 Dec 2020 23:06:31 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/3LlcJAzt_YuhSO_kAHz8lxrAiy0>
Subject: [CFRG] [Errata Rejected] RFC7748 (5651)
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Dec 2020 07:06:37 -0000

The following errata report has been rejected for RFC7748,
"Elliptic Curves for Security".

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid5651

--------------------------------------
Status: Rejected
Type: Technical

Reported by: Pierre Laurent <boutoukoat@yahoo.fr>
Date Reported: 2019-03-11
Rejected by: Stanislav Smyshlyaev (IRSG)

Section: 5

Original Text
-------------
z_2 = E * (AA + a24 * E)

Corrected Text
--------------
z_2 = E * (BB + a24 * E)

Notes
-----
When BB is used, the point multiplication of the second test vector

P = (0x13a415c749d54cfc3e3cc06f10e7db312cae38059d95b7f4d3116878120f21e5, 0x1) 

by scalar k
0x4dba18799e16a42cd401eae021641bc1f56a7d959126d25a3c67b4d1d4e96648

gives the expected point
[k]P = (0x5779ac7a64f7f8e652a19f79685a598bf873b8b45ce4ad7a7d90e87694decb95, 0x1)

The implementation based on AA gives the unexpected point 
[k]P = (0x3884d5c22af664f822cb3dd728b03c9fac1e1d78c772a74f05546566bd7bed9c, 1)
 --VERIFIER NOTES-- 
It is proposed to modify the algorithm description for calculation of z_2. However, after checking the original algorithm independently, it was confirmed that the expected numbers are obtained. Therefore, the existing text of RFC does not have any errors here.

--------------------------------------
RFC7748 (draft-irtf-cfrg-curves-11)
--------------------------------------
Title               : Elliptic Curves for Security
Publication Date    : January 2016
Author(s)           : A. Langley, M. Hamburg, S. Turner
Category            : INFORMATIONAL
Source              : Crypto Forum Research Group
Area                : N/A
Stream              : IRTF
Verifying Party     : IRSG