1. oid: It is fine for me to extend it by only the PEN option.
2. signatureAlgorithm: the only reason I see here is it breaks the already 
deployed certificates.
  2.1. Considering the PQC certificate, the public key may be several 
kilo-bytes, without the one-pass signature property, the additional required 
memory usage is not ignorable. 
 2.2. As mentioned in the 
https://github.com/cose-wg/CBOR-certificates/issues/152,  if the CRL have the 
same structure as in the current certificate, the impact may be much larger. To 
parse the CRL, the application has to parse the *revokedCertificates* field 
before getting the signature algorithm. And since revokedCertificates may be 
very large, e,g. In mega-bytes. IMHO, putting the *signatureAlgorithm* at the 
begging is necessary. 
2.3. To unify the structures of certificates and CRLs, I think  
*signatureAlgorithm* shall also be at the begging. To keep the backwards  
compatibility with the deployed certificates, we shall increase the syntax 
version (the *version* field).

- Lijun (github/xipki)
_______________________________________________
COSE mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cose

Reply via email to