-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How do we store varying secret key sizes #172
Comments
@dingens suggested that we remove the benchmarks and add the short key sizes to the corresponding parameter sets as comment. |
I'd rather add the missing parameter sets, since it gives an interesting time-space tradeoff. |
This is a general issue not only about dilithium. The main problem is that we have somewhat over-simplified our data model by storing the secret key size as a property of the parameter set, when in fact it can vary between implementations. The comment way I suggested is how we "solved" this for most of the other schemes. I don't think adding a separate parameter set is a good way. We'd have a ton of additional parameter sets that are not really separate parameter sets because they are interoperable. I'd stick with the simple one KAT is one paramset rule. I tend to think secret key size is not among the important factors for selecting a scheme (memory usage is more critical and we don't store that a lot currently), so it's enough to just store some well balanced If we want to store more data but without changing the scheme too much*, we could add field |
We don't track for Dilithium the short secret key size (96 bytes, see Specification, section 3.1). We should either remove the benchmarks with
short_sk
or add the additional parameter sets.The text was updated successfully, but these errors were encountered: