Replies: 2 comments 8 replies
-
It's concatenation. Depending on your preferences, you may want to read either a paper: https://s3.amazonaws.com/files.douglas.stebila.ca/files/research/papers/NISTPQC-CroPaqSte19.pdf or the code, e.g. Lines 990 to 1049 in 38e12f1 is_hybrid flag).
|
Beta Was this translation helpful? Give feedback.
3 replies
-
Hello, |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Dear all,
I would kindly requesting your valuable feedback related to the creation of hybrid certificates for digital signatures.
More specifically, by reading the information related to the Section of the Supported Algorithms for Authentication, I read the following:
"if SIG claims NIST L1 or L2 security, then the fork provides the methods rsa3072_SIG and p256_SIG, which combine SIG with RSA3072 and with ECDSA using NIST's P256 curve respectively."
Is there any way to seek more information how this actually works and what the word "combine" means? Is it about a serial concatenation of the public keys and the signature values, is it a kind of encapsulation or anything else?
I really appreciate your time and valuable feedback.
Kind regards
Beta Was this translation helpful? Give feedback.
All reactions