----- Forwarded message from Sean Lynch <seanl@literati.org> ----- Date: Wed, 16 Oct 2013 12:50:55 -0700 From: Sean Lynch <seanl@literati.org> To: theory and practice of decentralized computer networks <p2p-hackers@lists.zooko.com> Subject: Re: [p2p-hackers] Distributed identity, chat, publishing, and sharing Message-ID: <87a9i9f10g.fsf@literati.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (gnu/linux) Reply-To: theory and practice of decentralized computer networks <p2p-hackers@lists.zooko.com> ianG <iang@iang.org> writes:
BTW, why the keenness on Ed25519?
Sorry for the delayed response. I managed to lose track of this message migrating between Gmail and my own server. I like Ed25519 because the public keys are 255 bits long, which makes them potentially usable directly as identifiers. However, more recent events have changed my thinking on this. Schneier speculates that one of the NSA's breakthroughs the Snowden documents talks about may be an advance in the cryptanalysis of ECC systems, and he recommends sticking with better-studied, more conventional systems based on the conventional discrete logarithm problem. On top of that, given the dynamic nature of cryptographic technology, it's probably not a good idea to lock oneself into a particular cryptosystem or hash scheme or even to require that identifiers be keys themselves. An identifier scheme could support Ed25519 as one particularly convenient key type, but eventually we'll want to support fingerprints as identifiers and fetching of public keys from a DHT. -- Sean Lynch <seanl@literati.org> _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5