Skip to content

Update: COSE elliptic curve signatures 'in the wild' from small RustyKey® alpha-test user base #2339

@antonymott

Description

@antonymott

@antonymott Thanks for reporting back! That's very encouraging to see how commonly Ed25519 is being supported! Have you tried to understand how many of those are security keys vs platform authenticators? If I had to guess all the -8 are security keys 🤔

Originally posted by @MasterKale in #1757

2025 WebAuthn COSE Algorithm Usage Update + Post-Quantum Initiative

@MasterKale - One year later (Oct 2025), our RustyKey® alpha-sites (statistically noisy/unreliable user base), shows:

  • 95% -7 (EcDSA)
  • 4.2% -8 (EdDSA)
  • <1% -257 (RS256)

Yes, you are correct: even one year on, -8 (Edwards curve) appears to be only from physical security keys, not platform authenticators. Is this not surprising, given Apple specs allow for -8 algorithm choice and our implementation allows both -8 and -7? The Edwards curve greatly lowers the risk of side-channel attacks as it uses deterministic signing, rather than relying on the generation of cryptographically secure random numbers every signature. Why would Apple and it seems most platform vendors continue to support the more vulnerable Weierstrasse curve? I wonder if our dataset is too small to make these conclusions statistically meaningful.

🔐 Post-Quantum Gap in COSE Registry

TL;DR: COSE registry lacks post-quantum algorithms. We're building an open-source Web-assembly (WASM) ML-KEM support - interested in FidoAlliance collaboration?

What we've done:

  • 🚀 Published a DRAFT/WIP open-source quantum-resistant-rustykey - fast WASM implementation of NIST ML-KEM
  • 🔎 tested for standards compliance (will perform 3rd party audit, but need more resources)
  • 📝 Started IETF Internet-Draft RFC for COSE registry inclusion
  • 🎓 University of Quantum Science, a Seattle based Private Foundation which supports open-source projects and that I'm associated with, provided partial funding but not enough to move fast with this if others expect to install and consume the implementation as a robust, tested, audited reliable open-source project

What we need:

  • FidoAlliance interest/support assessment
  • RFC collaboration partners
  • Dev time funding for WIP open-source npm package improvements

Install & contribute: pnpm i quantum-resistant-rustykey

Worth pursuing or too early? LMK if this deserves its own issue. 🤔

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions