Skip to main content

Hedged ECDSA and EdDSA Signatures
draft-irtf-cfrg-det-sigs-with-noise-03

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Active".
Expired & archived
Authors John Preuß Mattsson , Erik Thormarker , Sini Ruohomaa
Last updated 2024-09-17 (Latest revision 2024-03-16)
Replaces draft-mattsson-cfrg-det-sigs-with-noise
RFC stream Internet Research Task Force (IRTF)
Formats
Additional resources Mailing list discussion
Stream IRTF state Active RG Document
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Deterministic elliptic-curve signatures such as deterministic ECDSA and EdDSA have gained popularity over randomized ECDSA as their security does not depend on a source of high-quality randomness. Recent research, however, has found that implementations of these signature algorithms may be vulnerable to certain side-channel and fault injection attacks due to their deterministic nature. One countermeasure to such attacks is hedged signatures where the calculation of the per-message secret number includes both fresh randomness and the message. This document updates RFC 6979 and RFC 8032 to recommend hedged constructions in deployments where side- channel attacks and fault injection attacks are a concern. The updates are invisible to the validator of the signature and compatible with existing ECDSA and EdDSA validators.

Authors

John Preuß Mattsson
Erik Thormarker
Sini Ruohomaa

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)