Skip to content

Commit

Permalink
Add SHOULD to deterministic ECDSA usage.
Browse files Browse the repository at this point in the history
  • Loading branch information
Wind4Greg committed Aug 21, 2023
1 parent a9f2510 commit 472f666
Showing 1 changed file with 10 additions and 3 deletions.
13 changes: 10 additions & 3 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -408,8 +408,9 @@ <h4>DataIntegrityProof</h4>
`controller`.
</p>
<p>
The `proofValue` property of the proof MUST be an ECDSA or deterministic ECDSA
signature produced according to [[FIPS-186-5]] using the curves and hashes as
The `proofValue` property of the proof MUST be an ECDSA signature, in general,
and SHOULD be a <em>deterministic</em> ECDSA signature, specific variant,
produced according to [[FIPS-186-5]] using the curves and hashes as
specified in section <a href="#algorithms"></a>, encoded according to section 7
of [[RFC4754]] (sometimes referred to as the IEEE P1363 format), and serialized
according to [[MULTIBASE]] using the base58-btc base encoding.
Expand Down Expand Up @@ -446,6 +447,8 @@ <h2>Algorithms</h2>
<p>
The following section describes multiple Data Integrity cryptographic suites
that utilize the Elliptic Curve Digital Signature Algorithm (ECDSA) [[FIPS-186-5]].
When generating ECDSA signatures the <em>deterministic</em> ECDSA algorithm
variant SHOULD be used.
</p>

<section>
Expand Down Expand Up @@ -2592,9 +2595,13 @@ <h3>Implementation Considerations for ECDSA Algorithms</h3>
publicized integrity breaches in widely deployed systems. To counter this problem,
a hash-based method of determining the secret number <em>k</em>, called
<em>Deterministic ECDSA</em>, is given in [[FIPS-186-5]] and [[RFC6979]].
</p>
<p>
Verification of a ECDSA signature is independent of the method of generating
<em>k</em>. Hence it is generally recommended to use <em>Deterministic
ECDSA</em> unless other requirements dictate otherwise.
ECDSA</em> unless other requirements dictate otherwise. For example, using
different <em>k</em> values results in different signature values for the same
document which may be a desirable property in some privacy enhancing situations.
</p>
</section>
<section class="informative">
Expand Down

0 comments on commit 472f666

Please sign in to comment.