TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Digital signatures and how to avoid them

278 pointsby _ikke_8 months ago

6 comments

kccqzy8 months ago
The author mentions HMAC at the end. I think HMAC is really an underrated technique. I remember reading Colin Percival&#x27;s classic <i>Cryptographic Right Answers</i>[0] and saw a section about &quot;symmetric signatures.&quot; I pondered to myself what scheme I could use for that before I looked at the answer: of course it&#x27;s just HMAC. I feel like this is another perspective that ought to be more widely known: if you want something to be like a signature, but the two parties (or just a single party at different times) can share a key, HMAC really is the right answer. Things like, a server needs to cryptographically sign a cookie to prevent tempering: that&#x27;s HMAC. Or a server needs to know an API request is coming from an expected client: that&#x27;s also HMAC.<p>[0]: <a href="https:&#x2F;&#x2F;www.daemonology.net&#x2F;blog&#x2F;2009-06-11-cryptographic-right-answers.html" rel="nofollow">https:&#x2F;&#x2F;www.daemonology.net&#x2F;blog&#x2F;2009-06-11-cryptographic-ri...</a>
评论 #41598251 未加载
评论 #41599606 未加载
评论 #41598218 未加载
评论 #41598230 未加载
评论 #41597917 未加载
评论 #41604718 未加载
sandij8 months ago
This article is very relevant in the context of the EU Digital Identity Wallet, and digital credentials in general, such as ISO&#x2F;IEC 18013-5 mobile driver licenses and other mdocs.<p>We may accidentially end up with non-repudiation of attribute presentation, thinking that this increases assurance for the parties involved in a transaction. The legal framework is not designed for this and insufficiently protects the credential subject for example.<p>Instead, the high assurance use cases should complement digital credentials (with plausible deniability of past presentations) with qualified e-signatures and e-seals. For these, the EU for example does provide a legal framework that protects both the relying party and the signer.
评论 #41597835 未加载
评论 #41596359 未加载
评论 #41618275 未加载
评论 #41607845 未加载
评论 #41597506 未加载
rpigab8 months ago
To me, DKIM doesn&#x27;t prove that the user john.smith@gmail.com sent that email. It proves that gmail.com sent it.<p>I&#x27;d avoid trusting FAANGs in courts when the fate of political leaders is at stake.
评论 #41604097 未加载
评论 #41610367 未加载
talkingtab8 months ago
I am a user, but not expert in cryptography, but I find the title of the article to be bait and switch. A more accurate title would be &quot;Pitfalls of using Digital Signatures and Possible Alternatives&quot;.
gyush8 months ago
&gt; As well as authenticating a message, they also provide third-party verifiability and (part of) non-repudiation.<p>I think digital signatures and third party verification are an incredibly useful feature. The ability to prove you received some data from some third party lets you prove things about yourself, and enables better data privacy long-term, especially when you have selective disclosure when combined with zero knowledge proofs. See: <a href="https:&#x2F;&#x2F;www.andrewclu.com&#x2F;sign-everything" rel="nofollow">https:&#x2F;&#x2F;www.andrewclu.com&#x2F;sign-everything</a> -- the ability to make all your data self-sovereign and selectively prove data to the outside world (i.e. prove I&#x27;m over 18 without showing my whole passport) can be extremely beneficial, especially as we move towards a world of AI generated content where provenant proofs can prove content origin to third parties. You&#x27;re right that post quantum signature research is still in progress, but I suspect that until post-quantum supremacy, it&#x27;s still useful (and by then I hope we&#x27;ll have fast and small post quantum signature schemes).<p>EU&#x27;s digital signatures let you do this for your IDs and <a href="https:&#x2F;&#x2F;www.openpassport.app&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.openpassport.app&#x2F;</a> lets you do this for any country passport, but imagine you could do this for all your social media data, personal info, and login details. we could have full selective privacy online, but only if everyone uses digital signatures instead of HMACs.
评论 #41604170 未加载
评论 #41600699 未加载
评论 #41606830 未加载
next_xibalba8 months ago
Slightly off topic:<p>In school I only took one cryptography class (it was bundled with networking, at that), and to this day I still think it contained some of the most amazing concepts I&#x27;ve ever learned. Public-key cryptography being on the short list along with cryptographic hash functions. Maybe it&#x27;s my particular bias, or maybe cryptography has just attracted some of the most creative genius&#x27; of the 20th century.
评论 #41606132 未加载