IANA is asked to establish a registry of signature algorithm values,
named "CT Signature Algorithms".
The following notes should be added:
* This is a subset of the TLS SignatureScheme Registry, limited to
those algorithms that are appropriate for CT. A major advantage
of this is leveraging the expertise of the TLS working group and
its Designated Expert(s).
Sorry if I am late commenting on this issue, but I haven't been
following this list (or the document) very closely.
While the above policy may be fine at the moment, I am concerned that it
may be an issue in the future.
The signature algorithms in the NIST Post-Quantum Cryptography
Standardization
<https://csrc.nist.gov/Projects/post-quantum-cryptography/round-3-submissions>
project generally have much larger signatures than the algorithms listed
in Table 8 of draft-ietf-trans-rfc6962-bis-37. For example smallest
Falcon signatures are 666 bytes and the smallest CRYSTALS-Dilithium
signatures are 2420 bytes. Two of the candidate signature algorithms
have smaller signatures, 33 bytes for GeMSS and 66 bytes for Rainbow,
but these algorithms have very large public keys, 352.19 KB for GeMSS
and 101.2 KB for Rainbow. There are, of course, other post-quantum
signature algorithms that were not submitted to NIST that have small
signatures sizes, but it is my understanding that they all tend to have
very large public keys as well.
It is my understanding that for Certificate Transparency signature size
is very important while public key size isn't, but for TLS client and
server authentication what's more important is the total size of the
signature plus the public key. So, when the time comes to select
post-quantum signature algorithms, it is quite possible that the
algorithms that are best suited for Certificate Transparency would be
considered unacceptable for TLS.
I suppose an algorithm could be added to the TLS SignatureScheme
registry even if it did have one, two, or three hundred KB public keys
and so was unlikely to ever be used for TLS. However, I just wanted to
raise a potential issue with limiting Certificate Transparency to only
using signature schemes approved for use with TLS.
Thanks,
David Cooper
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans