-
Notifications
You must be signed in to change notification settings - Fork 256
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature to support curve "P-256k1" (secp256k1) #222
Comments
Hey @iamliqiang, thanks for opening the issue. We currently don't support SCEP (it's on the roadmap) so that's probably why we haven't gotten around to this curve. I have a question though: I don't see this as one of the supported curves in the golang crypto library (https://golang.org/pkg/crypto/elliptic/#Curve). I assume this means we would have to roll our own support, use a fork of the crypto lib, or pull in a dependency that implements this curve? Given that this curve isn't supported by default I get the sense this would be a far reaching change. |
there is a good implement reference: secp256k1 is more safe than P256 by NIST, that is why it is used wildly by bitcoin、ethereum and mainstream blockchain; and not P256, NSA and NIST support P256, and maybe has backdoor |
Awesome! Thanks for linking the reference! I mentioned before that SCEP support is on the horizon, so we'll probably wait to implement this simultaneously. Unless we see more support from the community asking for this curve in the short term. In which case we'll re-prioritize. If anyone has some spare cycles to add this curve, we'd happily accept a PR :) |
Ah, shoot. I think I got a bit confused. In the description of the issue we used the term "scep256" and I assumed wrongly assumed this was associated with SCEP. The curve appears to be "secp256" and is not directly associated with SCEP. So please ignore what I said about the SCEP timeline. We'll put this issue in the backlog for now and prioritize based on incoming support from the community. Still very open to PRs though :) |
@dopey thanks,yes it is secp256k1 curve,and used wildly in blockchain |
For the other curves we're using the IANA registered names that are documented as part of the JSON Web Algorithms (JWA) spec, and used by the other JOSE specs (JWK, JWT, JWS, etc). If we're going to add this curve we need to figure out what to call it. I took a look at the IANA registry and I don't see a standard name for this curve. Perhaps there's a draft spec out there somewhere with a name for it that we could use? It's also possible that the JWA spec is drawing from another standard or semi-formal namespace, and there may be a name for this curve there? Relatedly, does anyone know where the |
@dopey yes 👍 this algorithm is gaining traction in the Crypto world and is being standardized. It would be great if smallstep support it about go implements ,there is a similar talking : square/go-jose#263, and square/go-jose#278, maybe help. there is a refer draft : JSON Web Token (JWT) with ES256K (secp256k1) signature |
What would you like to be added
step crypto keypair--kty EC --curve only support P256 P384 P512, but P256k1 ( scep256k1) is used wildly, why not support it
Why this is needed
add EC --curve secp256k1 support
The text was updated successfully, but these errors were encountered: