Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for HSMs #204

Open
andrewwhitehead opened this issue Aug 8, 2022 · 1 comment
Open

Support for HSMs #204

andrewwhitehead opened this issue Aug 8, 2022 · 1 comment

Comments

@andrewwhitehead
Copy link
Contributor

andrewwhitehead commented Aug 8, 2022

I'm just opening this issue for discussion of whether the current algorithms preclude support for signing by an HSM (hardware security module) or other types of key vaults.

Some questions that come to mind:

  • Is it reasonable to assume that the HSM will compute (or ship with) the required generator points, or would they need to be submitted by the caller?
  • Would there need to be a limit on the number of signed messages?
  • Should the messages be submitted as scalars in order to support different message encodings?
  • Do specific ciphersuites need to be explicitly supported (and perhaps included in the key metadata to prevent reuse across ciphersuites)?
  • What would support for blind signing look like?

And in general, are there examples of multi-message signing APIs for comparison?

@mikelodder7
Copy link
Contributor

The problem with HSMs is you can only multiply a point by the secret value and they only return the X coordinate which means you have to figure out which Y coordinate to use otherwise it breaks. Until they support returning the full point I’m not sure how the HSM can help. Software enclaves can do much better so perhaps that should be the focus first

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants