Replies: 1 comment 2 replies
-
Indeed, it's just generally recommended to not reuse key material in different contexts. There's also the fact that signing keys and encryption keys typically have different lifecycles, with encryption keys often being frequently replaced. Then there can sometimes be cross-protocol attacks, as briefly mentioned here. There hasn't been much direct research into it as far as I'm aware, but the consensus seems to be that it's probably secure, just not a sensible default choice for the reasons above. The safest approach will always be to use two different types of keys. It sounds like that paper found it to be secure, but I'm not good at reading cryptography papers as I'm still unfamiliar with the notation and don't like maths. |
Beta Was this translation helpful? Give feedback.
-
I have a use-case for users needing both a signing key and an encryption key, both of which will be on Curve 25519. (They're for distinct operations. I don't want signcryption and I'm happy with the authenticated encryption, but I also need to actually-sign one thing.) I've read the FAQ entry "How can I sign and encrypt using the same key pair?" and understood all of it—except for this one part that's left vague (emphasis mine):
This then links to a page about how to do it, which again notes:
and then links to a paper containing
what appears to be a proof that it is in fact safe to do so.[EDIT: Apparently it just has a proof for one specific use of these keys, not the general case. Or at least, that's what someone on IRC seemed to be saying?]As best I can figure, the reasoning here is that there's always some risk in using the same key material in two different cryptographic constructions or for two different purposes, but that's just based on some background information the paper lays out.
So, questions:
Beta Was this translation helpful? Give feedback.
All reactions