Achim Kraus <achimkr...@gmx.net> writes:

>Does using x25519 for ECDHE is significant less secure than using it with
>e.g. secp384r1?

The NIST curves AFAIK are never used that way, it's only done with 25519
(there was something about it in an OpenPGP draft, but I think GPG went
straight to 25519 and only used ECDSA for signatures).

What I'm specifically referring to is DH run sideways, as someone put it
during the X9.42 discussion, i.e. used in static-ephemeral mode to try and
make it work like it's RSA.

In all the code audits I've done of 25519 used that way, I've never seen it
used correctly.  Usually there isn't just one mistake made but many of them.
It's such an obvious problem that that and misuse of RC4-equivalent modes/
algorithms like GCM and ChaCha20 are the first things I look for in crypto
code.

Peter.


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to