-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Random Oracle Requirements for AKE #414
Comments
I don't think you need a kdf for curve25519, but how people get to the seed matters. You might look at BIP44 and BIP39 and see if there is anything relevant. |
Chiming in here -- I also don't think we need to KDF the input seed Note that the input is already presumed to be a (pseudo)-random output:
I recommend we close this issue without changing anything. |
I think there might be a misunderstand here, my suggestions is to not use KDF for the input seed. Specifically we currently do not use |
Oh, thanks for the clarification! I think the original message got lost a bit after a small game of telephone, and I perpetrated that, sorry :) I think we should continue using However, ristretto255 and P-256 do need to do HashToScalar in order to be considered secure, and this is done in VOPRF. The VOPRF draft also references the hash-to-curve draft about this, from https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-hash-to-curve-16#name-hashing-to-a-finite-field:
So, I believe curve25519 is a unique beast in that respect. But dropping HashToScalar for ristretto255 and P-256 would be a mistake. |
Ah, thank you, I missed that. I think that pretty much answers my question and resolves this issue. |
During #404 a question came up on why a random oracle is required for the NIST and Ristretto ciphersuites but not for Curve25519: #404 (comment).
Currently NIST and Ristretto use the OPRF
DeriveKeyPair
function: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-voprf-21#name-deterministic-key-generatio. Which is more complicated and also compute intensive then simply using the NIST ECDSA Key Pair Generation by Rejection Sampling.As far as I can tell, if
HashToScalar
can be dropped in key generation for the AKE without any security concerns, it would be an overall gain for the specification; reducing complexity and computational requirements.The text was updated successfully, but these errors were encountered: