[cabfpub] SHA-1 Collision Found
rob.stradling at comodo.com
Fri Feb 24 20:03:00 UTC 2017
On 24/02/17 19:32, Adam Langley wrote:
> On Fri, Feb 24, 2017 at 11:09 AM, Rob Stradling via Public wrote:
> My current wishlist:
> Various EdDSA algorithms. See RFC8032 and
> BLAKE2. See RFC7693. (No signature algorithm OIDs exist yet, AFAICT).
> I too have sympathies towards BLAKE2 since I wanted BLAKE to win.
> However, given that the winner was Keccak, and its performance doesn't
> matter in the context of certificate signatures (well, perhaps for
> CRLs), I suspect that we should probably just stick with SHA-3 here.
> It's certainly very different from SHA-2 and diversity is a goal.
Hi Adam. I agree that having more options just for the sake of having
more options isn't actually helpful. Enough options to achieve
sufficient diversity is enough.
How much do we care about NIST's blessing these days?
EdDSA/Curve25519/etc isn't a NIST product.
Is there a case for using BLAKE2 for certificate signatures _instead_ of
Performance does matter for other uses of hash algorithms, so why not
settle on using BLAKE2 for everything (and not implement SHA-3 at all)?
Senior Research & Development Scientist
COMODO - Creating Trust Online
More information about the Public