Skip to main content

Hedged ECDSA and EdDSA Signatures
draft-irtf-cfrg-det-sigs-with-noise-05

Document Type Expired Internet-Draft (cfrg RG)
Expired & archived
Authors John Preuß Mattsson , Erik Thormarker , Sini Ruohomaa
Last updated 2025-09-04 (Latest revision 2025-03-03)
Replaces draft-mattsson-cfrg-det-sigs-with-noise
RFC stream Internet Research Task Force (IRTF)
Intended RFC status Informational
Formats
Additional resources Mailing list discussion
Stream IRTF state Active RG Document
Consensus boilerplate Unknown
Document shepherd (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Deterministic elliptic-curve signatures such as deterministic ECDSA and EdDSA have gained popularity over randomized ECDSA as their security does not depend on a source of high-quality randomness. Recent research, however, has found that implementations of these signature algorithms may be vulnerable to certain side-channel and fault injection attacks due to their deterministic nature. One countermeasure to such attacks is hedged signatures where the calculation of the per-message secret number includes both fresh randomness and the message. This document updates RFC 6979 and RFC 8032 to recommend hedged constructions in deployments where side- channel attacks and fault injection attacks are a concern. The updates are invisible to the validator of the signature and compatible with existing ECDSA and EdDSA validators.

Authors

John Preuß Mattsson
Erik Thormarker
Sini Ruohomaa

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)