Approved from my end.

Best,

 B. Westerbaan



> On 29 Jun 2025, at 18:59, Megan Ferguson <mfergu...@staff.rfc-editor.org> 
> wrote:
> 
> Hi Russ,
> 
> Thank you for your reply and guidance.  We have updated accordingly (note 
> that these files also include the edit revision you previously mentioned).  
> We believe all of our queries have been resolved except confirmation of our 
> update to use <sup> in the xml.
> 
> Please review the files carefully as we do not make changes after 
> publication.  
> 
> The files have been posted here (please refresh):
>   https://www.rfc-editor.org/authors/rfc9814.txt
>   https://www.rfc-editor.org/authors/rfc9814.pdf
>   https://www.rfc-editor.org/authors/rfc9814.html
>   https://www.rfc-editor.org/authors/rfc9814.xml
> 
> The relevant diff files have been posted here (please refresh):
>   https://www.rfc-editor.org/authors/rfc9814-diff.html (comprehensive diff)
>   https://www.rfc-editor.org/authors/rfc9814-auth48diff.html (AUTH48 changes 
> only)
> 
> Please contact us with any further updates/questions/comments you may have.  
> 
> We will await approvals from each of the parties listed on the AUTH48 status 
> page prior to moving forward to publication.  
> 
> The AUTH48 status page for this document is available here:
> 
> https://www.rfc-editor.org/auth48/rfc9814
> 
> Thank you.
> 
> RFC Editor/mf
> 
>> On Jun 28, 2025, at 1:24 PM, Russ Housley <hous...@vigilsec.com> wrote:
>> 
>> Dear RFC Editor:
>> 
>>> 1) <!-- [rfced] Please insert any keywords (beyond those that appear in
>>>   the title) for use on https://www.rfc-editor.org/search. -->
>> 
>> Please add:
>> stateless hash-based signature algorithm
>> 
>> 
>>> 2) <!--[rfced] We see the following similar sentences repeated throughout
>>>   the document.  Please review and let us know if these should be
>>>   made uniform.
>>> 
>>> Original:
>>> 
>>> SLH-DSA is a stateless hash-based signature scheme. (Abstract)
>>> 
>>> SLH-DSA is a stateless hash-based signature algorithm. (Intro)
>>> 
>>> SLH-DSA is a hash-based signature scheme. (Section 2)
>>> 
>>> SLH-DSA is a stateless hash-based signature algorithm.  (Section 2)
>>> -->
>> 
>> My preference is:
>> SLH-DSA is a stateless hash-based signature algorithm
>> 
>> 
>>> 3) <!--[rfced] Might we rephrase to avoid the repeated "using" in this
>>>   sentence?
>>> 
>>> Original:
>>> 
>>> CMS values are generated using ASN.1 [X680], using the Basic Encoding
>>> Rules (BER) and the Distinguished Encoding Rules (DER) [X690].
>>> 
>>> Perhaps:
>>> 
>>> CMS values are generated with ASN.1 [X680] using the Basic Encoding
>>> Rules (BER) and the Distinguished Encoding Rules (DER) [X690].
>>> -->
>> 
>> Yes, this is fine.
>> 
>> 
>>> 4) <!--[rfced] As WOTS+ includes "one-time signature" in its expansion,
>>>   would this update work?
>>> 
>>> Original:
>>> 
>>> The FORS tree roots are signed by a WOTS+ one-time signature private
>>> key.
>>> 
>>> Perhaps:
>>> The FORS tree roots are signed by a WOTS+ private key.
>>> -->
>> 
>> Yes, this is fine.
>> 
>> 
>>> 5) <!--[rfced] Please review our updates to this sentence to reduce
>>>   redundancy to confirm we have maintained your intended meaning.
>>> 
>>> Original:
>>> A SLH-DSA signature is verified by verifying the FORS signature, the
>>> WOTS+ signatures and the path to the root of each subtree.
>>> 
>>> Current:
>>> An SLH-DSA signature is verified using the FORS signature, the WOTS+
>>> signatures, and the path to the root of each subtree.
>>> -->
>> 
>> Yes, this is fine.
>> 
>> 
>>> 6) <!--[rfced] There may be text missing in this sentence.  If our
>>>   suggested text does not convey your intended meaning, please let
>>>   us know how we may rephrase.
>>> 
>>> Original:
>>> Although its security decreases, FORS which is used at the bottom of
>>> the SLH-DSA hypertree does not collapse if the same private key used
>>> to sign two or more different messages like in stateful hash-based
>>> signature schemes.
>>> 
>>> Perhaps:
>>> Although its security decreases, FORS, which is used at the bottom of
>>> the SLH-DSA hypertree, does not collapse if the same private key used
>>> to sign two or more different messages is used (as is the case in
>>> stateful hash-based signature schemes).
>>> -->
>> 
>> I suggest:
>> FORS is used at the bottom of the SLH-DSA hypertree.  Security decreases 
>> if the same private key is used to sign two or more different messages, but
>> security does not collapse, as is the case in stateful hash-based signature
>> algorithms.
>> 
>> 
>>> 7) <!-- [rfced] FYI, we have used the <sup> element for superscript in
>>>   this document.  Please review and let us know any objections.
>>> -->
>> 
>> Scott, you are probably the best one to perform this check.
>> 
>> 
>>> 8) <!--[rfced] We note that "SHA2" does not appear in [FIPS180].  Please
>>>   review and confirm this citation:
>>> 
>>> Original:
>>> 
>>> The AlgorithmIdentifier for a SLH-DSA public key MUST use one of the
>>> twelve id-slh-dsa object identifiers listed below, based on the
>>> security level used to generate the SLH-DSA hypertree, the small or
>>> fast version of the algorithm, and the use of SHA2 [FIPS180] or SHAKE
>>> [FIPS202].
>>> 
>>> -->
>> 
>> FIPS 180 defines the SHA2 family of hash functions.  The SHA3 family came 
>> later, so it is not surprising that FIPS 180 does not use that term.  It 
>> will not be a problem for implementers.
>> 
>> 
>>> 9) <!-- [rfced] FYI - We have added expansions for abbreviations upon
>>>   first use per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please
>>>   review each expansion in the document carefully to ensure
>>>   correctness.
>>> -->
>> 
>> It looks fine to me.
>> 
>> Russ
>> 
> 
> 

-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to