Re: [Cfrg] Summary of the poll: Elliptic Curves - signature scheme: friendliness to low memory implementations (ends on June 3rd)

Alyssa Rowan <akr@akr.io> Fri, 19 June 2015 18:00 UTC

Return-Path: <akr@akr.io>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C49201ACE27 for <cfrg@ietfa.amsl.com>; Fri, 19 Jun 2015 11:00:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.798
X-Spam-Level:
X-Spam-Status: No, score=0.798 tagged_above=-999 required=5 tests=[BAYES_50=0.8, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9y0w_B2n4NKm for <cfrg@ietfa.amsl.com>; Fri, 19 Jun 2015 11:00:09 -0700 (PDT)
Received: from entima.net (entima.net [78.129.143.175]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16F8F1ACE1B for <cfrg@irtf.org>; Fri, 19 Jun 2015 11:00:08 -0700 (PDT)
Message-ID: <558458AF.6080301@akr.io>
Date: Fri, 19 Jun 2015 19:00:15 +0100
From: Alyssa Rowan <akr@akr.io>
MIME-Version: 1.0
To: cfrg@irtf.org
References: <20150619062752.3506.qmail@cr.yp.to>
In-Reply-To: <20150619062752.3506.qmail@cr.yp.to>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/cfrg/_KNlrKzyLQfHUuoZS9fDNX-Mts4>
Subject: Re: [Cfrg] Summary of the poll: Elliptic Curves - signature scheme: friendliness to low memory implementations (ends on June 3rd)
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Jun 2015 18:00:14 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 2015-06-19 07:27, D. J. Bernstein wrote:

> I understand that the chairs are saying that the following
> position has rough consensus:

I've largely stayed out of this poll as I don't have an incredibly
strong opinion here, but I'd also like clarity.

EdDSA(H(m)) is weaker than EdDSA(m). Of course we desire
collision-resistance in any hash that we choose, but EdDSA(m) doesn't
NEED it.

If we propose a change to Ed25519 that makes it weaker, we'll need to
be very, very careful to justify why: otherwise our recommendations to
the upstream working group may well not be useful in contrast to
existing rough consensus and running code in, e.g., GnuPG and OpenSSH.
If we don't have a strong opinion, is it really worth the change?

TLS WG don't seem to have any concerns about Ed25519 implementation:
they're in fact talking about which OIDs to allocate. They are the
ones who will implement it in a way which most interacts with
init-update-final APIs: if they don't care to change it, need we?

- -- 
/akr
-----BEGIN PGP SIGNATURE-----
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=z1jx
-----END PGP SIGNATURE-----