You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I already have some interesting findings: as I said above, we use ECDSA and here the snippet from the blogpost of @stribika:
ECDSA with SHA256, SHA384 or SHA512 depending on key size
...
Number 2 here involves NIST suckage and should be disabled as well. Another important disadvantage of DSA and ECDSA is that it uses randomness for each signature. If the random numbers are not the best quality, then it is possible to recover the secret key.
Maybe it would be also nice to ask @stribika for a review of our findings and changes.
@atomic111 what do you think? something I missed? Do you have time to do this in the next week, if not - its fine, I can do this and you can review it :)
The text was updated successfully, but these errors were encountered:
@bazbremner raised this point in the GH-141 and myself and @atomic111 had this topic also in some phone call in the last days
So we should check following things:
My idea would be to go completely through the following docs and check the things above:
I already have some interesting findings: as I said above, we use ECDSA and here the snippet from the blogpost of @stribika:
Maybe it would be also nice to ask @stribika for a review of our findings and changes.
@atomic111 what do you think? something I missed? Do you have time to do this in the next week, if not - its fine, I can do this and you can review it :)
The text was updated successfully, but these errors were encountered: