Hi,
“Digital signature schemes needed to enable existentially unforgeable signatures
with respect to an adaptive chosen message attack (EUF-CMA security).”
I think NIST should strongly prefer signatures that are believed to provide strong existentially unforgeable signatures with respect to an adaptive chosen message attack (SUF-CMA security) rather than only EUF-CMA security.
EdDSA, ML-DSA, and SLH-DSA are all SUF-CMA. EUF-CMA only signatures can lead to significant vulnerabilities such as replay of messages, double billing, double money transactions, double receipts, double contracts, as well as log and transaction history poisoning. SUF-CMA vs EUF-CMA is not a theoretic consideration; it is very much a real-world problem. NIST signature algorithms are used in a wide variety of use cases.
EUF-CMA only signatures do not align well with the excellent NIST guidelines [1]:
“Cryptographic standards and guidelines should be chosen to minimize the demands on users and implementers as well as the adverse consequences of human mistakes and equipment failures.”
“NIST strives to standardize secure cryptographic algorithms, schemes, and modes of operation whose security properties are …. robust against accidental misuse””
We know that most developers assume that all signatures are SUF-CMA.
My preference would be that NIST do not standardize any new signature algorithms that are believed to only provide EUF-CMA security unless there is a compelling justification. SUF-CMA is best practice for any modern standard.
Cheers,
John Preuß Mattsson
Expert Cryptographic Algorithms and Security Protocols, Ericsson
[1] NIST Cryptographic Standards and Guidelines Development Process
https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.7977.pdf
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
pqc-forum+...@list.nist.gov.
To view this discussion visit
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/1748dd33-a5e9-42ae-a1c1-a6aa936f77ffn%40list.nist.gov.