Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

spike: analyse use of ECC keys as default instead of RSA keys #1201

Open
murali-shris opened this issue Jan 10, 2024 · 2 comments
Open

spike: analyse use of ECC keys as default instead of RSA keys #1201

murali-shris opened this issue Jan 10, 2024 · 2 comments
Assignees
Labels
enhancement New feature or request

Comments

@murali-shris
Copy link
Member

Is your feature request related to a problem? Please describe.

  • RSA 2048 is default asymmetric key generated on client side for pkam/encryption

Describe the solution you'd like

  • explore the use of ECC keys
    Outcome of the spike
  • backward compatibility if default impl is changed
  • explore ECC impl libraries in dart
  • document code changes required

Describe alternatives you've considered

No response

Additional context

No response

@murali-shris murali-shris added the enhancement New feature or request label Jan 10, 2024
@murali-shris murali-shris self-assigned this Jan 10, 2024
@murali-shris
Copy link
Member Author

Things to explore

  • Read on MLS/Signal protocol
  • if we are cutting a key to encrypt data for another atsign. how long should the key live.
  • Use of different set of keys for encrypting data

@murali-shris
Copy link
Member Author

Went through double rachet algo used in signal.
TODO - write up on how to incorporate some of the concepts in at protocol data sharing

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant