<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Mon, Jul 25, 2016 at 2:11 AM, Peter Schwabe <span dir="ltr"><<a href="mailto:peter@cryptojedi.org" target="_blank">peter@cryptojedi.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Probably I should just look at the code, but what validation did you<br>
include there? Is it the one described in the Crypto 2016 paper or the<br>
NSA validation? I'm asking because the one by Costello, Longa, and<br>
Naehrig is (as far as I understand) only against passive attackers<br>
(i.e., not for static keys).<br></blockquote><div><br></div><div>I'm using the Validate_PKA() and Validate_PKB() functions from Microsoft's reference code. What those functions are doing behind the scenes I could not say.<br><br></div></div>This was more an experiment on my part: can something with the structure of SIDHp751 be integrated into Noise and how many of the Noise patterns can we get while doing that?<br><br>The code is all off in a branch and I'm not planning to merge it into master any time soon. The reference code is a little messy (lots of compiler warnings), it's slow compared to New Hope, I'm still a little iffy as to whether using SIDH for more than ephemeral key exchanges is a good idea, and yes the validation rules make alarms go off in my head.<br><br>When used right I'm sure it is a pretty good algorithm, but if it is hard to use right ...<br><br></div><div class="gmail_extra">Cheers,<br><br></div><div class="gmail_extra">Rhys.<br><br></div></div>