-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Be more specific on component signature and public key serialization. #106
Comments
The appendix has the encoding section that you added right? Doesn't that make it clear? For example, Around Page 62: we have this description: ECDSA NIST 256 -- AlgorithmIdentifier of Public Key ASN.1: DER: ECDSA NIST 256 -- AlgorithmIdentifier of Signature Ounsworth, et al. Expires 24 April 2025 [Page 63] ASN.1: DER: Appendix B has this table that shows where the specification comes from: +=========================+=========================+=============+ So RFC 5758 should specify what he is looking for, does it not? I looked at 5758 and it says this: Encoding rules for ECDSA signature values are specified in RFC 3279 And RFC 5480 contains the ASN.1 needed to encode ECDSA keys (for example). I guess we could pull the encodings from 5480 into our already huge document if we think it is helpful. |
OK, thanks. |
A colleague of mine struggled to find the correct way for serializing the component signatures and public keys.
We want bytes to conacatenate both components. While its quite clear for ML-DSA since the FIPS-204 defines the byte encoding. But for e.g. ECDSA its unclear.
Or do I miss something?
@ounsworth @johngray-dev @feventura
The text was updated successfully, but these errors were encountered: