-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pluggeable Crypto Frameworks #5
Comments
This'd be great! We've discussed this elsewhere, I'll try to post a summary here:
|
To my knowledge, ECDSA was favored in Mobile due to its smaller key sizes. Same rationale is valid for blockchains so the transactions and the blocks are small. Example public key implementation for ECDSA:
|
$ node ex2.js |
Noble secp256k1 apparently is faster and has better security. Maybe later... |
@joigno I just realized we can change the signing algorithm in the identities to whatever we want (make it pluggable as in the description of the issue) and then keep using RSA to make the simple shared secret handshake we are using now. Say, the SecureNetworkAgent could generate a strong RSA keypair on startup, and then we modify the handshake so that the secret for symmetric crypto is encoded using this keypair, and its pubkey is signed by whatever scheme each identity has chosen. |
Choose your own public key crypto framework.
The text was updated successfully, but these errors were encountered: