2017
DOI: 10.17487/rfc8080
|View full text |Cite
|
Sign up to set email alerts
|

Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…The DNSSEC protocol allows adding new cryptographic algorithms relatively easily, and new algorithms have been proposed and integrated numerous times [38,42,55]. All algorithms, however, must adhere to boundaries and requirements set by the design and deployment of DNS, DNSSEC and the underlying transport protocols.…”
Section: Cryptographic Requirementsmentioning
confidence: 99%
“…The DNSSEC protocol allows adding new cryptographic algorithms relatively easily, and new algorithms have been proposed and integrated numerous times [38,42,55]. All algorithms, however, must adhere to boundaries and requirements set by the design and deployment of DNS, DNSSEC and the underlying transport protocols.…”
Section: Cryptographic Requirementsmentioning
confidence: 99%
“…Algorithm 1 shows the process to sign the message. The detail explanation of EdDSA is given in [28].…”
Section: A Regular Setup Attack Edwards-curve Digital Signature Algorithmmentioning
confidence: 99%
“…Note that our attack extracts one secret bit for each execution of the victim; hence, if the victim picks a fresh nonce at each execution, two bits extracted by our attack would be completely uncorrelated. Nevertheless, EdDSA is deterministic [27] and the nonce is computed as function of the message to be signed and the signing key. Hence, by feeding a fixed message to the signing routine we ensure that the nonce is always the same and can extract one of its bits at each execution.…”
Section: Attacks On Mpi_ec_mul_pointmentioning
confidence: 99%