From 9643299546b522590feaf1e2b3a212370f3d8690 Mon Sep 17 00:00:00 2001 From: Paul Schaub Date: Fri, 8 Dec 2023 23:11:07 +0100 Subject: [PATCH] Describe nested one-pass-signatures --- book/source/07-signing_data.md | 55 +++++++++++++++++++++++++++------- 1 file changed, 45 insertions(+), 10 deletions(-) diff --git a/book/source/07-signing_data.md b/book/source/07-signing_data.md index a9d7c6b..a219643 100644 --- a/book/source/07-signing_data.md +++ b/book/source/07-signing_data.md @@ -69,13 +69,7 @@ To produce an {term}`inline signature`, the {term}`signer` processes the entiret For efficient {term}`verification`, an application must understand how to handle the {term}`literal data` prior to its reading. This requirement is addressed by the {term}`one-pass signature packets` located at the beginning of {term}`inline-signed` messages. These {term}`packets` include essential information such as the {term}`fingerprint` of the {term}`signing key` and the {term}`hash` algorithm used for computing the {term}`signature`'s {term}`hash digest`. This setup enables the verifier to process the data correctly and efficiently. -```{admonition} TODO -:class: warning - -Is the signer keyid/fingerprint in the OPS important for the verifier to be able to verify the signature efficiently? Or is it (only?) there to be hashed and signed, along with the literal data? - -Realization: It's probably useful to know the fingerprints right away, to first go find the public key material, before calculating the hash of a huge file. -``` +Strictly speaking, the hash algorithm would be sufficient to begin the verification process, but having the signers fingerprint/key-id available upfront allows to fetch the signers certificate before processing the entirety of the - potentially large - signed data. #### Verification @@ -148,8 +142,49 @@ Despite their widespread adoption, {term}`cleartext signatures