9.2 KiB
published |
---|
false |
Crypto
- FYI: Cryptography Review and Recommendations for W3C VC and W3C DID Implementations by SRI International John, Anil (Wednesday, 26 January)
This type of independent review is critically important for U.S. Government entities who are deploying capabilities based on these standards to ensure that the technologies conform to relevant U.S. Federal government standards and requirements, including the Federal Information Security Management Act (FISMA) and National Institute of Technology (NIST) standards for use of cryptography.
Please find attached (and online at the link below) the results of this independent review and the associated cryptography implementation recommendations.
-
SRI-Cryptography Review and Recommendations for W3C VCDM and W3C DID Standards.docx
-
Blog on SSI and Cryptographically Enforceable Policies (Tuesday, 8 February)
I've posted a new SSI blog entitled: "Protecting Sensitive Parts of Credentials with Cryptographically Enforceable Policies".
It has a proposal that enables credential issuers to encrypt sensitive parts of credentials in such a way that can only be decrypted by parties tha satisfy the issuer's policy (that was used to encrypt these parts). The blog motivates the need, introduces a high-level architecture, explains how it would work, and discusses some issues that need to be looked into.
- Use of cryptography with W3C VCs and DIDs released Manu Sporny (Thursday, 21 April)
Cryptography Review of W3C Verifiable Credentials Data Model (VCDM) and Decentralized Identifiers (DIDs) Standards and Cryptography Implementation Recommendations by David Balenson & Nick Genise
It's largely a view from the US NIST cybersecurity standards, which are used through most of the world, but not everywhere. In any case, it's a valuable perspective that I hope the VC2WG and DIDWG takes into the next stage of the work.
- Universal signature verifier Marcus Sabadello (Wednesday, 4 May)
We (Danube Tech) have a "Universal Verifier" here: https://univerifier.io/
But I don't claim that it actually supports all the credential formats and signature suites in existence...
Especially considering that at the last Internet Identity Workshop a lot of different formats were identified:
-
https://docs.google.com/document/d/1aNHvPhFv85HHlG8Ry2etrw15KdY830oAL804rMFY9bY
-
Updating SafeCurves for 2022... Manu Sporny (Tuesday, 24 May)
-
Guidance for Choosing an Elliptic Curve Signature Algorithm in 2022
It suggests updates to the SafeCurves website
- Cross-vendor interop for Data Integrity and Ed25519Signature2020 achieved Manu Sporny (Tuesday, 17 May)
We are happy to announce today that we have our first demonstration of cross-vendor interoperability between Danube Tech and Digital Bazaar for verification regarding the Data Integrity and Ed25519Signature2020 work items:
-
[https://w3c-ccg.github.io/di-ed25519-test-suite/#Data%20Integrity%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/%23Data%2520Integrity%2520(verifier)
-
[https://w3c-ccg.github.io/di-ed25519-test-suite/#Ed25519Signature2020%20(verifier](https://w3c-ccg.github.io/di-ed25519-test-suite/%23Ed25519Signature2020%2520(verifier)
-
Streamlining Data Integrity Cryptosuites Manu Sporny (Sunday, 31 July)
- Publication request for Data Integrity CGFRs Manu Sporny (Tuesday, 26 July)
This is a publication request for four Data Integrity Community Group
Final Reports. Namely:
-
ZK for Authentication With Nolan and Locke from NuID - ZeroKnowledge Podcast.
Universally Composable Direct Anonymous Attestation by Jan Camenisch , Manu Drijvers , and Anja LehmannPractical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain by Jan Camenisch , Manu Drijvers , and Anja LehmannPrivacy-Preserving User-Auditable Pseudonym Systems by Jan Camenisch & Anja Lehmann IBM Research – Zurich
Jose-Cose
- Two new COSE- and JOSE-related Internet Drafts with Tobias Looker Mike Jones
This week, Tobias Looker and I submitted two individual Internet Drafts for consideration by the COSE working group.
- XMSS: Generating usable test vectors for JOSE and COSE Orie Steele (Sunday, 3 April)
We've been working on generating test vectors for: https://datatracker.ietf.org/doc/html/rfc8391 $1$2
That we could use to register the kty
and alg
for XMSS such that it could be used by JOSE and COSE.
Quantum
- Future-proofing VCs via multiple signatures Manu Sporny (Thursday, 6 January)
What this means is that it is now possible to not have to depend on one signature format, and instead use multiple to meet different needs. The VC above supports NIST-approved cryptography today, while enabling the advanced use of BBS+ (if an organization would like to use it /before/ it is standardized at IETF), and also enabling protection if a quantum computer were to break both Ed25519 and BBS+... all on the same VC in a fairly compact format.
- re: New Work Item Incubating for IETF: JSON Encoding for Post Quantum Signatures Orie Steele (Tuesday, 1 February)
I look forward to continuing to work on JSON encoding for post quantum signature schemes.
In particular, support for JWS and JWK as building blocks for higher order cryptographic systems, such as DIDs and VCs.
If you are interested in contributing, please feel free to open issues here: https://github.com/mesur-io/post-quantum-signatures
-
Post Quantum and Related Mike Prorock (Wednesday, 6 July)
-
And a pretty good game plan from CISA with some timing implications here
The TLDR is to assume that we need hard answers as a community, and at the standards level, on crypto agility by 2024, as well as support for the key algorithms as listed above.
- [CEIP] Draft paper on Cryptographically Enforceable Issuer Policies Joosten, H.J.M. (Rieks) May 30
my colleague Sterre and I drafted a paper that we provisionally called Cryptographically Enforceable Issuer Policies, which describes our current thinking on this topic.
The paper isn’t finished. We need more text in the ‘discussions’ section, and hope that by making the draft available we’ll get the discussions that we (or you?) can describe in there. Also, we might have missed stuff that you as a reader need for a proper understanding of what this is all about, and to start pondering for what (other) purposes all this might be used. Or why this proposal is a very bad idea that we should not spend any more time on.