-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IANA codepoint for DHKEM-over-secp256k1 #286
Comments
@kwantam Thank you too for writing the DHKEM-secp256k1 draft! See the Issue: #108 My The problem was that my implementation adopted the compact key representation. Specifically, the secret/key lengths are defined as follows:
My suggestion is:
What do you think? In fact, I was considering creating issues on the github repo for your draft to (1) add support for the compact key representation and (2) update the KEM identifier to resolve the conflict with Deterministic Nonce-less Hybrid Public Key Encryption.
Your contributions are very welcome! |
Ah! I did not notice the compact vs non-compact issue. Thanks for pointing it out! (and sorry for the trouble...) Completely happy to update the draft with the compact suite and to request another codepoint. But I think I am probably missing something with regard the compact suites: what's the reason for them? Even if the suite specifies the use of an uncompressed code point, any public key can be sent over the wire in compressed form, then decompressed on the other side before being used for HPKE. Or is the idea that one uses an X-only ladder for ECDH, thereby saving both communication and the cost of point decompression? Anyhow, I'll get back to you after I have updated the draft and requested another codepoint :) |
I think the point is only in the On the other hand, the non-compact version is still needed because there are some cases that a secp256k1 implementation does not support the compressed mode. But it's just my opinion. Experts around CFRG/HPKE might have other opinions. Anyway, I'm ready to follow the CFRG/HPKE decision. |
@kwantam if you (and CFRG/HPKE community) decide to add the compact version of DHKEM-secp256k1, I'm willing to assist in making test vectors, so please feel free to ask me. I'd be happy to contribute to your draft :-) |
Hi folks! Thanks for a really useful implementation.
I recently wrote a brief specification for HPKE using DHKEM over secp256k1, for which IANA has allocated the codepoint 0x0016. (I am sorry to report that the code point 0x0013 used in this project's experimental implementation was already allocated to a different DHKEM variant, as you can see from the link above.)
It would be great if this project could update its experimental DHKEM-over-secp256k1 implementation to use this codepoint! I'm happy to submit a pull request---please let me know if/how I can be helpful.
The text was updated successfully, but these errors were encountered: