paseto-standard / paseto-spec

Specification for Platform Agnostic SEcurity TOkens (PASETO)
165 stars 9 forks source link

Deprecate `v3.public.` #32

Open conradludgate opened 11 months ago

conradludgate commented 11 months ago

In https://github.com/paseto-standard/paseto-spec/blob/master/docs/Rationale-V3-V4.md there are numerous claims that Ed25519 should be preferred over P-384.

ECDSA is much more dangerous to implement than Ed25519

If you're concerned about NSA backdoors, don't use v3 (which only uses NIST-approved algorithms). Use v4 instead.

At the bottom, it states

If you want smaller tokens or better performance than P-384, make sure Ed25519 lands in FIPS 186-5 and use v4.public instead.

Ed25519 did land in FIPS 186-5 and therefore v4.public. features only NIST-approved algorithms. Since v3 exists only for NIST-dependant applications, it is now redundant.

conradludgate commented 11 months ago

This deprecation would add complications when paired with PASERK, however.

paragonie-security commented 11 months ago

We aren't going to deprecate v3.public. until the CNSA permits Ed25519.