[cabfpub] SHA-3 and/or Curve-X
philliph at comodo.com
philliph at comodo.com
Fri Feb 24 19:25:28 UTC 2017
> On Feb 24, 2017, at 1:34 PM, Gervase Markham <gerv at mozilla.org> wrote:
> Hi Philip,
> This is a useful timeline. It may be missing a few items, though:
> On 24/02/17 09:58, philliph--- via Public wrote:
>> The availability of HSMs is a concern but it is actually the very last
>> but one on the critical path which is at present
>> * NIST issues FIPS (done)
>> * IETF publishes specification (started on this)
>> * CABForum amends guidelines to permit use
> * OS vendors and crypto libraries add support
>> * Browsers add support
>> * HSM vendors ship product
>> * CAs issue certificates.
> There is also another item: "Root store policies amended to permit use".
> However, where that goes and where the CAB Forum item goes is flexible;
> both have to happen before "CAs issue certificates" but they don't
> necessarily have to happen earlier than that. Having said that, I can
> see a case for a CAB Forum "motion of intent" to set direction. What
> algorithms other than SHA-3 would we want to include in such a motion?
There are many moving parts to the puzzle, agreed. The reason I left out the crypto libs is that it only requires them to add existing code. They can all add the same code in fact.
A motion of intent sounds like a good way forward.
The complicating factor is the ECC work which is the reason I have been waiting to launch this. My original plan was to propose Curve-X forst after the CURDLE WG was finished with their PKIX draft. That is now in WG last call. I was going to do SHA-3 second.
Given the SHA-1 situation I think SHA-3 is more urgent. But my desired endpoint is to have SHA-3 and Curve-X in the acceptable algorithms.
The issue with Curve-X is that right now the specs are completely new and so there are no implementations of the final spec anywhere. There are not even that many implementations of the Curve-X signature algorithm. We are clearly no ready to add Curve-X to the accepted algorithms but we could have a motion of intent to do so. And I think that would be very useful.
The argument for Curve-X is in two parts, first, why move from our existing NIST curves?
* Deployment of the NIST curves has been stalled due to the Snowden/BULLRUN/DUAL-EC-RNG fiasco.
* The NIST curves are now quite old and they are based on a construction approach that is no longer considered to be state of the art. They are not rigid construction and they were constructed before the need to demonstrate the parameters are free from interference was understood.
* The NIST curves compete with several others (Brainpool etc.)
* The NIST curves require competent implementation to be secure. They are not robust against certain types of attack. The implementations could not use certain point compression techniques that improve security but were encumbered.
* The international crypto community has possibly relied on NIST rather too much. It is important to remember that we are not just relying on an institution, we are relying on people and many if not most of the people we rely on are passed their civil service retirement point.
The arguments for Curve-X are
* The curves and the signature algorithm are entirely modern and state of the art. They have been thoroughly vetted and reviewed by a blue ribband panel of leading international cryptographers.
* Curve25519 has a vast deployment base outside PKIX, much larger than the NIST curves.
* Curve25519 and Curve 448 have market momentum. IETF is making them the de facto next generation public key algorithm as the successor to RSA.
* The CFRG curve competition has effectively cleared all the competing curves from the board. The curve zoo of 30+ possibilities has been reduced to two clear choices.
The main argument against is:
* Quantum Cryptanalysis could render all this pointless. But since it would also take out RSA and is a hypothetical and we don’t have anything close to a QRC alternative, its not an argument against having a backup for RSA2048.
I have little doubt that the industry will eventually settle on the Curve-X work. It is not my absolute favorite set of choices on a technical level but it is certainly a result I can and do endorse. The question now is whether CABForum should try to speed up that transition process or not.
The main argument against would be if there was the possibility of yet another alternative appearing and I really don’t see that happening. Just as the AES competition killed most development of new symmetric algorithms for a decade and the SHA-3 competition has likely done the same, I don’t see any real likelihood of a new Public Key algorithm being promoted as a standard for use in IETF, W3C or OASIS protocols for quite a while.
I would expect that cryptographers looking to make their mark right now would be looking at QRC approaches and working to refine those.
More information about the Public