Hi Paul

On Mon, May 08, 2017 at 12:46:21PM -0400, Paul Wouters wrote:
> Not only that, but the reason specified is to bump RSA from
> RSASSA-PKCS1-v1_5 to RSASSA-PSS. As far as I know, the security
> issues of RSASSA-PKCS1-v1_5 are that when using it to _encrypt_
> bogus data, it can be used as an oracle to obtain private key
> bits. That means there is no on-the-wire security issue with
> RSASSA-PKCS1-v1_5 for Digital Signatures. And if HSMs are used
> to protect access to private keys, those keys should be marked
> as "signing only keys" to avoid exposing the private key via this
> attack if the machine with the HSM is compromised.

It isn't that the RSASSA-PKCS1-v1_5 signature scheme is currently
broken. Revision 00 of the draft had used the RSASSA-PKCS1-v1_5 scheme
to make it easier for implementations, and so I was defending it among
colleagues at first.

However, RSASSA-PSS is a more robust signature scheme with a more exact
proof of security. We evaluated our choice and switched to that for use
with SHA-3 in revision 01 after it was pointed out on this list.

See "The Exact Security of Digital Signatures - How to Sign with RSA and
Rabin", Bellare and Rogaway for why it is an improvement (vs. FDH).

http://web.cs.ucdavis.edu/~rogaway/papers/exact.pdf

One nusiance of PSS is that it uses entropy during signing (a salt value
per signature) that may make it inconvenient for signing in environments
without an entropy source. However it is possible to to create
signatures with a non-random salt (so it was made a "SHOULD" in the
draft) with equivalent security to FDH. With the random salt, it is a
far more robust scheme for RSA signatures.

RSASSA-PKCS1-v1_5 is no longer allowed for new application due to its
lack of exact security.

I'll reply to the other comments soon.

                Mukund

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to