On Mon, Sep 24, 2012 at 4:06 PM, Jacob Appelbaum <ja...@appelbaum.net> wrote: > r? Not k? What happens if k repeats?
Ed25519 is a Schnorr signature based system and so the variable names are slightly different. It has the same RNG problem as (EC)DSA however and Ed25519 solves it with deterministic signatures. Since (EC)DSA generally has non-deterministic signatures, I'd recommend maintaining that property in any generic implementation: i.e. hash in the private key, message and entropy to generate k. That's what we do in Google systems. > But what is the right way to ensure that k has some safety without being > weaker by being predictable? I imagine a lot of OTR conversations start > with pretty well known plaintext such as "hi" or "hello" or some > variant. In OTR the data that is signed includes the two, ephemeral, DH public keys, not any user message. Therefore a deterministic signature shouldn't be problem because the signed data is random. Cheers AGL -- Adam Langley a...@imperialviolet.org http://www.imperialviolet.org _______________________________________________ OTR-dev mailing list OTR-dev@lists.cypherpunks.ca http://lists.cypherpunks.ca/mailman/listinfo/otr-dev