b1940a76ad
TLS used to prefer larger curves, under the idea that a larger curve has a higher security strength and is therefore harder to attack. However, brute force attacks are not a practical concern, so this was not particularly meaningful. If a curve is considered secure enough to be allowed, then we might as well use it. So order curves by resource usage. The exact definition of what this means is purposefully left open. It may include criteria such as performance and memory usage. Risk of side channels could be a factor as well, although it didn't affect the current choice. The current list happens to exactly correspond to the numbers reported by one run of the benchmark program for "full handshake/s" on my machine. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com> |
||
---|---|---|
.. | ||
00README | ||
ccm-alt.md | ||
cipher-delayed-output.md | ||
combine_SSL_CID-TLS1_3_PADDING_GRANULARITY_options.md | ||
csr-add-critical-extension.md | ||
default-curves.md | ||
gcm-alt.md | ||
gcm-multipart.md | ||
max-record-payload-api.md | ||
modify_MBEDTLS_ECP_FIXED_POINT_OPTIM_behaviour.md | ||
modify_SHA384_option_behaviour.md | ||
relaxed-psk-semantics.md | ||
remove-enable-weak-ciphersuites.md | ||
remove-max-content-len.md | ||
remove-null-entropy.md | ||
remove-rsa-mode-parameter.md | ||
Remove_3DES_ciphersuites.md | ||
remove_deprecated_functions_and_constants.md | ||
remove_mbedtls_check_params_option.md | ||
remove_MBEDTLS_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION.md | ||
remove_MBEDTLS_X509_CHECK_x_KEY_USAGE_options.md | ||
remove_SSL_DTLS_BADMAC_LIMIT_option.md | ||
remove_ssl_record_checking.md | ||
remove_supp_for_extensions_in_pre-v3_X_509_certs.md | ||
remove_support_for_tls_1.0_1.1_and_dtls_1.0.md | ||
rename_the__ret_functions.md | ||
rsa-padding.md | ||
separate_SHA224_from_SHA256.md | ||
session-cache-api.md | ||
sha512-output-type.md | ||
ssl-error-code-cleanup.md | ||
turn_SSL_SRV_RESPECT_CLIENT_PREFERENCE_config_opt_to_runtime_opt.md |