Yoav Nir writes:
> > That same draft could also point references to the suitable cfrg
> > document, and recommend not using the ph versions.
>
> Like this?
> https://tools.ietf.org/html/draft-nir-ipsecme-eddsa-00
Yep.
One nit:
OLD
To signal within IKE that no hashing needs to be done. A new
; Sent: Friday, April 8, 2016 9:30 AM
> To: Yoav Nir ; Tero Kivinen
> Cc: IPsecME WG
> Subject: Re: [IPsec] EdDSA Signatures in IKE
>
> "Identity" is the formally correct term, but I think "null" is much
> clearer than "identity". Especially
I also think that "null" is less ambiguous here.
Regards,
Valery.
-Original Message-
From: Yaron Sheffer
Sent: Friday, April 8, 2016 9:30 AM
To: Yoav Nir ; Tero Kivinen
Cc: IPsecME WG
Subject: Re: [IPsec] EdDSA Signatures in IKE
"Identity" is the formally corre
"Identity" is the formally correct term, but I think "null" is much
clearer than "identity". Especially in the context of certificates,
where "identity" can be mistaken for something else.
Thanks,
Yaron
On 04/08/2016 01:29 AM, Yoav Nir wrote:
On 7 Apr 2016, at 6:12 PM, Tero Kivinen
> On 7 Apr 2016, at 6:12 PM, Tero Kivinen wrote:
>
> Yoav Nir writes:
>> Tero: What would it take to register an “identity” hash function for
>> use with the EdDSA?
>
> I assume you mean new value for the RFC7427 Hash Algorithm registry?
> That registry is by expert review, but as "identity" is
Yoav Nir writes:
> Tero: What would it take to register an “identity” hash function for
> use with the EdDSA?
I assume you mean new value for the RFC7427 Hash Algorithm registry?
That registry is by expert review, but as "identity" is not
necessarely clear enough for the implementors, I would sugg
No responses yet...
Tero: What would it take to register an “identity” hash function for use with
the EdDSA?
Yoav
> On 5 Apr 2016, at 11:09 AM, Yoav Nir wrote:
>
> Replying to myself...
>
> I’ve been told off-list that it didn’t make sense to introduce the hot, new
> algorithm as a MAY. The
Replying to myself...
I’ve been told off-list that it didn’t make sense to introduce the hot, new
algorithm as a MAY. The only reason I’m suggesting this is that there are
currently no implementations to interop with, and no EdDSA certificates where
the public keys might come from. My main moti
Hi
At the meeting today, I presented the SafeCurves draft status and asked the
room whether we wanted to wait for CFRG and Curdle to settle their respective
RFCs. The room was unanimously in favor of not having anything in the current
draft, instead using RFC 7427 digital signatures. To be cert