-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SM2 Algorithm Support #131
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not familiar with the details of SM2 to judge whether the definition is mathematically correct. But I approve the principle to include this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM after these a
become an
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, missed two other locations of "a SM2" that should be "an SM2"
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe there is not a registered algorithm identifier for SM2 in https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms so there is no defined JOSE representation for this algorithm.
It is true that SM2 is not currently supported by JOSE and there is already a community proposal to suggest this feature: https://www.ietf.org/archive/id/draft-dang-webauthn-sm2-00.html But it doesn't seem to have been accepted. But I believe this should not be a barrier, the BLS12381G2 algorithm is also not on the JOSE list, which does not prevent did from using BLS12-381 as one of the optional signature algorithms. As one of the technical barriers is the definition of MultiCodoc, I have previously initiated proposals to define multibase prefixes for public and private keys for SM2. https://github.com/multiformats/multicodec/pulls?q=is%3Apr+is%3Aclosed+sm2 |
No, that was my mistake, I misunderstood you and thought you only wished to modify the two previous ones. |
I suggest submitting a new draft either called draft-dang-jose-sm2 or draft-dang-cose-sm2, depending upon which working group you want to consider it. (There isn't an IETF WebAuthn working group.) And then request presentation time at IETF 122 in Bangkok to ask for the draft to be considered by the working group. |
Thank you very much for your suggestions, I will take the time to figure out how to submit this draft. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My tweaks were made. English looks good. fwiw
The issue was discussed in a meeting on 2024-12-18
View the transcript2.3. Add SM2 Algorithm Support (pr cid#131)See github pull request cid#131. Brent Zundel: add SM2 algorithm support. Has a couple requests for changes. Manu Sporny: I put a change suggestion in there to see if the original person that raised the issue would have any objections. If they don't, we can merge it after. I'll remove the JSON web key expression and merge it after a day or two of waiting. Brent Zundel: I believe the changes requested by TallTed have gone in. Path forward is the SM2 algorithm that's being added will be added for Data Integrity, on the JWK side it would be handled at IETF. |
Overview
Add SM2 (ShangMi 2) cryptographic algorithm support to the controller document specification. SM2 is a public key cryptographic algorithm based on elliptic curves, which has been standardized as GM/T 0003-2012 by the State Cryptography Administration of China.
Changes
Motivation
SM2 is widely used in China's commercial cryptographic applications and has been proven to provide strong security. Adding SM2 support enhances the specification's compatibility with Chinese cryptographic standards and provides more options for implementers requiring compliance with Chinese regulations.
Impact
This addition expands the cryptographic algorithm options available to implementers while maintaining backward compatibility with existing implementations.
Related Issues
N/A
Preview | Diff