Closed danvangeest closed 1 day ago
NIST assigned OIDs to the parameter sets of the "pure" version of SLH-DSA and specific "pre-hash" combinations. See https://csrc.nist.gov/projects/computer-security-objects-register/algorithm-registration
Would it be better to include the "pre-hash" versions that have OIDs assigned for the sake of completeness?
The WG has been trying to curtail OID explosions.
That said, they may become necessary in X.509, see https://github.com/lamps-wg/dilithium-certificates/pull/31#issuecomment-2441892740
We can wait for that discussion to occur and the fallout from it. However, because CMS has the signedAttributes feature, predigest mode isn't really necessary because the signedAttributes encoding will be relatively small.
While the WG determined that they do not want HashML-DSA because ML-DSA can have the message representative calculated by a different module (outside an HSM for example), this is not possible for SLH-DSA because it does a dual-pass. The WG still thinks that HashSLH-DSA is not necessary for use by CA certificates, but we can't control what will be done by EE users, so during the presentation I said that we will add a section specifying HashSLH-DSA OIDs for use in SPKI of end-entity certificates.
There is also a desire to prune the OIDs, but I think we should just offer all them all first and then if people complain hard and offer suggestions, reduce the list.
Once NIST publishes FIPS205, decide what to do about pure vs predigest mode. If we only support pure mode, add this text to the introduction: