New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Noise Extension: Hybrid Forward Secrecy #39
Comments
Yes, I'm interested in adding HFS support. |
Hey all, in August/September I will probably have some time to implement this. Can I claim this issue for now? |
@dsprenkels go for it :). |
Here's some preliminary notes.
|
Hey @mcginty, today I have worked on the HFS support. I have pushed the updates to my |
I'd like to try out your branch... What is a valid Noise HFS specification string? |
Because Trevor's spec did not mention anything about the let params: NoiseParams = "Noise_NNhfs_25519_ChaChaPoly_SHA256".parse().unwrap();
let mut h_i = Builder::new(params.clone())
.kem(KemChoice::Kyber1024)
.build_initiator()
.unwrap(); In this case, the resolver is the default resolver (not I agree that, given the fact that Kyber1024 is currently the only supported KEM, explicitly choosing it might feel a bit pointless. Maybe this is something to be updated. Note to self: Ask the community about this. |
Hi all. I'm looking forward to this feature getting landed. No hurry I'm just saying that I'm looking forward. Cheers! |
This is now merged in master. |
Are you interested in this feature?
Here's the noise fork by Yawning Angel that has the XXhfs using NewHope-Simple:
Here's the spec extension:
https://raw.githubusercontent.com/noiseprotocol/noise_spec/41d478d3dd97d77a6695f4d6cf6283e2830e9ca6/extensions/ext_hybrid_forward_secrecy.md
The text was updated successfully, but these errors were encountered: