(no title)
kwantam | 1 year ago
(Rant: All these years later, we're all still doing penance for the fact that Schnorr signatures were patented and so everyone used ECDSA instead. It's an absolute garbage fire of a signature scheme and should be abandoned yesterday for many reasons, e.g., no real proof of security, terrible footguns like this.)
djao|1 year ago
EdDSA, which is essentially deterministic Schnorr, does solve the problem.
Also, the use of P-521 didn't specifically cause the vulnerability, but the bad interaction between SHA512 and P-521 did play a role. It is unfortunate that nature conspired against us to make 2^511 - 1 a composite number. The fact that you have to go up to 521 bits to get a Mersenne prime whereas the natural target length for a hash output is 512 bits is the fatal interaction here.
kwantam|1 year ago
(And indeed, nature could have been kinder to us and given us a Mersenne between 127 and 521...)
GoblinSlayer|1 year ago
CRConrad|1 year ago
Never heard of (which probably demonstrates that I know pretty much nothing about cryptography?), so seeing a name spelled like "Schn...r" in this context makes at least me think of an entirely different luminary in the area. Thought it was a typo at first.
SV_BubbleTime|1 year ago
Isn’t it kind of the point to just roll random numbers? When would you calculate?
ajb|1 year ago