Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ed25519 + system randomness #715

Open
burdges opened this issue Oct 10, 2024 · 3 comments
Open

ed25519 + system randomness #715

burdges opened this issue Oct 10, 2024 · 3 comments

Comments

@burdges
Copy link
Contributor

burdges commented Oct 10, 2024

There are several reasons one might desire an ed25519 flavor that employs system randomness, in addition to the usual derandomization. I've no idea any relevant standards exist, but the obvious method would be hashing 32 bytes of system randomness first when computing r. I could easily be done externally of course, but figured I'd ask here.

@tarcieri
Copy link
Contributor

Here's a draft: https://www.ietf.org/archive/id/draft-irtf-cfrg-det-sigs-with-noise-03.html#name-hedged-eddsa

@burdges
Copy link
Contributor Author

burdges commented Oct 10, 2024

The primary reasons to do this is actually multi-signatures schemes, like OLAF, FROST, etc, which doesn't matter if you're not doing those.

At the moment I almost wanted it just to save a few bytes a few when doing a back cert that should be "ephemeral", but that's kinda stupid of me.

@tarcieri
Copy link
Contributor

Preventing fault attacks on deterministic signature algorithms is another reason, particularly on embedded platforms

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants