IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Proposal and intent to implement "dsa-sha2-256" SSH key algorithm
denis bider <ietf-ssh3%denisbider.com@localhost> writes:
> I therefore suggest a new SSH key algorithm, dsa-sha2-256, which
> cherry-picks from FIPS 186-3 the following two options:
>
> L = 2048, N = 256
> L = 3072, N = 256
>
> In other words:
> - modulus size is either 2048 or 3072
> - subgroup size is 256 bits
> - hash function is SHA2-256
Makes sense to me.
Last time I looked at doing larger DSA, I had trouble finding any test
vectors. Does FIPS-186 include any now?
> I choose the name "dsa-sha2-256", rather than a suffixed name
> ("...@bitvise.com") for the following reasons:
I don't quite agree, but I don't have any strong objection either.
I think it would be nice with an (informational?) RFC spelling out those
details, and providing a few test vectors. Any then a non-suffixed name
is fully appropriate (and as far as I remember, the ietf requirements
for a new ssh algorithm name are pretty weak).
Regards,
/Niels
--
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
Home |
Main Index |
Thread Index |
Old Index