-
Notifications
You must be signed in to change notification settings - Fork 517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Strengthen signature verification failure tests #1999
Comments
If we wanted to thoroughly check trivial forgeries for SUF-CMA, instead of incrementing a single random byte we could have the test flip each bit of a signed message, one at a time, and expect a verification error. I made something similar to investigate #1995, would this be a welcome addition or is it out of scope? |
any improvement on testing the quality of code in OQS is welcome! |
@rtjk Your proposal above would be nice to include. Is it something you'd be able to spend some cycles on? |
Sure! I can adapt the test I wrote for CROSS. Would it make sense to keep this in |
Great! I think it would be okay to do all of it in |
For background, please see this discussion: #1919 (comment) and related issue #1995.
It may be desirable to modify or extend our signature tests to take into account "weaker" forgeries as well as specific security claims (EUF-CMA vs SUF-CMA).
The text was updated successfully, but these errors were encountered: