-----Original Message-----
From: Anders Rundgren <[email protected]> 
Sent: Saturday, September 19, 2020 11:25 PM
To: Jim Schaad <[email protected]>; [email protected]
Subject: Re: [jose] RFC 8037 "alg" quirkiness

On 2020-09-20 00:42, Jim Schaad wrote:
> Jumping back to the start.

It seems that your mail system generates duplicates.

FWIW, here is how the quirk manifests itself in my JOSE library:


     JSONObjectWriter setSignatureAlgorithm(JSONObjectWriter joseObject,
                                            SignatureAlgorithms 
signatureAlgorithm) {
         return joseObject.setString("alg",
                                     signatureAlgorithm.isOkp() ?
              "EdDSA" : signatureAlgorithm.getAlgorithmId());
     }

[JLS] This draft will soon render this code incorrect.  
https://datatracker.ietf.org/doc/draft-ietf-lwig-curve-representations/


Presumably few cryptographic API's accept "EdDSA" as a signature algorithm.

You could indeed have used "EdDSA" as signature algorithm in RFC 8410 but you 
did not and IMO you did the right choice.

Anyway, navigating in crypto-land is often a bit challenging:
https://mail.openjdk.java.net/pipermail/security-dev/2020-August/022348.html

I've made my point, nothing more to add on my side :)

Anders


> 
> -----Original Message-----
> From: jose <[email protected]> On Behalf Of Anders Rundgren
> Sent: Saturday, August 29, 2020 11:58 PM
> To: [email protected]
> Subject: [jose] RFC 8037 "alg" quirkiness
> 
> I have just implemented support for Edwards curves in my JSON library.
> 
> Although it is certainly not a deal-breaker I find the use of "EdDSA" 
> as a generic Edwards algorithm identifier rather quirky since it 
> departs from the other JWS algorithms:
> https://tools.ietf.org/html/rfc8037#appendix-A.4
> 
> [JLS]  I do not find this at all in consistent with the way that the 
> other signature algorithms were handled, but that may just be me.  For 
> the ECDSA algorithms, the size of the hash is specified because it 
> could be variable across the different curve sizes.  So you can do 
> ECDSA with SHA-512 and P-256.  The requirement to specify the hash was 
> needed to bring the number of options down to just those that are fixed by 
> the curve.
> 
> [JLS] For EdDSA, the hash function is fixed by the curve.  This would 
> change if different hash functions where allowed for the same curve 
> but I do not believe that this where ever be in danger of happening 
> because it was strongly argued that a single hash function was the 
> correct approach.  Since there was not a need to specify the hash 
> function independent of the key, there was no need to specify an EdDSA 
> with SHA-512 and an EdDSA with
> SHAKE-256 it was not done.
> 
> Jim
> 
> 
> For curiosity reasons I took a peek at the initial draft which has (in 
> my
> opinion...) a more logical solution:
> https://tools.ietf.org/html/draft-liusvaara-jose-cfrg-curves-00#append
> ix-A.4
> 
> May I ask why this change was performed?
> 
> For JSF (JSON Signature Format) I will stick to the "00" scheme which 
> also permits use of ed25519ph and friends if needed:
> https://mobilepki.org/jsf-lab/home
> 
> thanx,
> Anders
> 
> _______________________________________________
> jose mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/jose
> 

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to