Joseph Birr-Pixton <jpix...@gmail.com> wrote:

> I'd like to propose that TLS1.3 mandates RFC6979 deterministic ECDSA.
>

What about the way BoringSSL (and OpenSSL, I think) does it? It
incorporates all the inputs that RFC6979 does, but using SHA-512 instead of
HMAC. And, it also includes a random element in the SHA-512 hash.

Ed25519 uses SHA-512 instead of HMAC for the same purpose and people seem
to think it works fine.

Also hashing in some randomness seems like it would help avoid some side
channel leakage. Note that most (all the ones I've looked at for more than
5 minutes) open-source ECDSA implementations have side-channel issues of
various levels of significance.

Anyway, I do think that implementations should do something *like this* to
avoid problems when the RNG is bad, but I think prescribing RFC 6979 as the
solution is overly-specific, especially when it doesn't even seem to be the
best way to accomplish the goal in many cases.

Cheers,
Brian
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to