Dear,

I would like to ask how the future development of digital signature algorithms for the DKIM standard will be addressed. Currently the RSA algorithm is used, usually the size 1024b - 2048b, although it has been supported for 6 years the size up to 4096b and the Ed25519 algorithm. However, its extension is minimal. From my perspective DKIM:
RSA (according to RFC, supported DSS, EU directive eIDAS and X.509 standard)
- uses the PKCS#1 v1.5 padding, but thanks to the architecture I do not know about the possibility of applying Bleichenbacher attack ('98).
- I do not know about the possibility of using PKCS#1 v2.2 aka RSA-OAEP
- RSA has a subexponential complexity, therefore increasing the complexity of the attack requires significantly greater key - RSA 1024 recommended since 2001, RSA 2048 since 2015, RSA 3072 since 2020 (NIST, but similar ENISA in EU and many national authorities) Ed25519 (according to RFC, supported by FIPS 186-5, EU directive eIDAS and X.509 standard)
- has a constant time consuming
- has a low support
- according to the statistics adoption is somewhere around 5%
- the security equivalent roughly corresponds to RSA 3072
Ed448 (not in RFC, but supported by FIPS 186-5, EU directive eIDAS and X.509 standard)
- has a constant time consuming
- the security equivalent roughly corresponds to RSA 9216

Unfortunately, these algorithms are not resistant to quantum computers. It is debatable whether it will actually be possible to build such computers (see for more details https://thequantuminsider.com/2024/07/26/quantum-error-mitigation-may-face-hard-limits/), but the current development of cryptography is not just about quantum computers. As a precaution, it might be worth considering the possibility of extending the existing set of algorithms by Ed448, as well as the implementation of the new NIST standards. From my perspective, it is interesting to look at the complexity of attacks on current cryptography both on classical computers and the potential risk in terms of development, more at https://quantumcomputingreport.com/the-gqi-quantum-resource-estimator-playbook/, a graph containing visualization of the complexity.

NIST released the first three standards for quantum computer-resistant cryptography a few days ago (PQC aka Post Quantum Cryptography). Information can be found at https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards details then in files: FIPS 203 - Module-Lattice-Based Key-Encapsulation Mechanism https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf FIPS 204 - Module-Lattice-Based Digital Signature https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf FIPS 205 - Stateless Hash-Based Digital Signature https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf

What is our view and opinion?

Regards

Jan

--
--
-- --- ----- -
Jan Dušátko

Tracker number: +420 602 427 840
e-mail:         [email protected]
GPG:            https://keys.dusatko.org/2E7D58B90FC2867C.asc

_______________________________________________
Ietf-dkim mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to