On Thu, 2015-09-24 at 18:26 +0300, Ilari Liusvaara wrote:
> On Thu, Sep 24, 2015 at 04:03:28PM +0200, Nikos Mavrogiannopoulos
> wrote:
> > On Thu, 2015-09-24 at 15:27 +0300, Ilari Liusvaara wrote:
> > 
> > > 4) For TLS PoP signatures, does it make sense to use HashEdDSA at
> > > all?
> > > Another way would to always use PureEdDSA and perform hash
> > > separtion
> > > from TLS side (e.g. sign(privkey, hash_func_id|H(tbs_data))).
> > > The certificate signatures are different matter tho, since CAs
> > > use
> > > HSMs for signing (those HSMs tend to be rather beefy, but still).
> > 
> > The problem with the PureEdDSA is that if you use a smart card or
> > an
> > HSM (both common for TLS), you have to transfer lots of data to
> > them,
> > something that may render it not really useful.
> 
> Well, hash_func_id|H(tbs_data) is 33-65 bytes for most nontrivial
> hashes.
> 
> In TLS 1.3 Editor's copy, tbs_data itself is <150 bytes (but there
> will be changes to merge certificate and its verify, which will
> presumably enlarge that a bit, but still maybe <200 bytes).


Correct and that's not an issue for most hw out there, but I was
thinking it in the sense that if we standardize a signing algorithm, it
should be the same whether we sign large files or a TLS handshake.

Said that, I pretty much like the properties of PureEd25519, I just
think the practicalities around it are not insignificant.

regards,
Nikos

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to