You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
EC is smaller, faster, and more secure than RSA - TDF should use EC keys, there is no good reason not to.
This would reduce the number of "important keys" in the system that people (and our scripts, and KAS, and hardware modules) have to keep track of.
The biggest practical implementation difference between nanoTDF (which has no public spec) and TDF is the use of EC vs RSA keys - removing this would allow us to simplify our SDK logic, and share more code between the nanoTDF and TDF codepaths, as well as our KAS codepaths.
This would require us to major-version bump the spec, add EC keys, and mark the use of RSA as deprecated - we should not be afraid of doing this.
The text was updated successfully, but these errors were encountered:
bleggett
changed the title
RSA keys should be deprecated in favor of EC keys in the spec
KAS RSA keys should be deprecated in favor of EC keys in the spec
Dec 1, 2022
Right now, TDF uses an RSA keypair for wrapping.
EC is smaller, faster, and more secure than RSA - TDF should use EC keys, there is no good reason not to.
This would reduce the number of "important keys" in the system that people (and our scripts, and KAS, and hardware modules) have to keep track of.
The biggest practical implementation difference between nanoTDF (which has no public spec) and TDF is the use of EC vs RSA keys - removing this would allow us to simplify our SDK logic, and share more code between the nanoTDF and TDF codepaths, as well as our KAS codepaths.
This would require us to major-version bump the spec, add EC keys, and mark the use of RSA as deprecated - we should not be afraid of doing this.
The text was updated successfully, but these errors were encountered: