Background
Every algorithms on the list has a reference, an origin. Usually it is a paper or an article where the cryptographic algorithm is described, including the rationale behind it, the target use case, the mathematical description and some other aspects.
The proposal is to include this origin, in the form of a link to every crypto algorithm
origin
- Description: link pointing at the description of the corresponding algorithm
- Values: URL
examples
For AES (Advanced Encryption Standard)
The origin is a newer version of https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
Reference: FIPS PUB 197 – Specification for the Advanced Encryption Standard (AES)
For Ed25519
Reference: Daniel J. Bernstein et al. – High-speed high-security signatures
Rationale
Each algorithms definition should include in the SPDX C.A. List links pointing to the publication that originally describes the algorithm or to the URL that points to where the algorithm is described technically.
In the detection use case, as well as in the auditing use case, such link is relevant to understand in detail the characteristices of the algorithm, what is used for, how it should be implemented and used, etc...
Description
This new property requires:
- A property name
- A property description
- A values description
- Some origins as example
Points for discussion
- Some of the algorithms has gone through revisions and even standardization processes. origin might refer to the current version of the algorithm.
- If the algorithm is deprecated by another algorithm but still present in the list, origin refers again to the latest version or revision before it was deprecated
- In an original exploration, it might be difficult or controversial to find the origin. What do we do in such cases?
- Is origin the right term, given that there might be revisions and standardizations processes for some cases?
- In some cases, the origin is a well known portal for papers and the origin comes in different formats, like LaTeX, pdf.... Which link should we take?
Actions
DoD
Background
Every algorithms on the list has a reference, an origin. Usually it is a paper or an article where the cryptographic algorithm is described, including the rationale behind it, the target use case, the mathematical description and some other aspects.
The proposal is to include this origin, in the form of a link to every crypto algorithm
origin
examples
For AES (Advanced Encryption Standard)
The origin is a newer version of https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
Reference: FIPS PUB 197 – Specification for the Advanced Encryption Standard (AES)
For Ed25519
Reference: Daniel J. Bernstein et al. – High-speed high-security signatures
Rationale
Each algorithms definition should include in the SPDX C.A. List links pointing to the publication that originally describes the algorithm or to the URL that points to where the algorithm is described technically.
In the detection use case, as well as in the auditing use case, such link is relevant to understand in detail the characteristices of the algorithm, what is used for, how it should be implemented and used, etc...
Description
This new property requires:
Points for discussion
Actions
DoD