Updated README to reflect maintenance status (#660)
* Updated README to reflect maintenance status This PR is to be merged after the branches are reworked. * FIDO -> CTAP * Wording change to default branch
This commit is contained in:
42
README.md
42
README.md
@@ -1,14 +1,9 @@
|
|||||||
# <img alt="OpenSK logo" src="docs/img/OpenSK.svg" width="200px">
|
# <img alt="OpenSK logo" src="docs/img/OpenSK.svg" width="200px">
|
||||||
|
|
||||||

|
This branch is unmaintained. It implements the CTAP 2.0 version of OpenSK.
|
||||||

|
Please check out the default branch for maintained code.
|
||||||

|
If you are a developer, go to the
|
||||||

|
[develop branch](https://github.com/google/OpenSK/tree/develop).
|
||||||
[](https://coveralls.io/github/google/OpenSK?branch=stable)
|
|
||||||
|
|
||||||
*News:*
|
|
||||||
|
|
||||||
- 2023-08-24: [PQC paper reference](#Research)
|
|
||||||
|
|
||||||
## OpenSK
|
## OpenSK
|
||||||
|
|
||||||
@@ -24,16 +19,11 @@ You can see OpenSK in action in this
|
|||||||
|
|
||||||
### FIDO2
|
### FIDO2
|
||||||
|
|
||||||
The stable branch implements the
|
This branch implements the
|
||||||
[CTAP2.0 specification](https://fidoalliance.org/specs/fido-v2.0-ps-20190130/fido-client-to-authenticator-protocol-v2.0-ps-20190130.html)
|
[CTAP2.0 specification](https://fidoalliance.org/specs/fido-v2.0-ps-20190130/fido-client-to-authenticator-protocol-v2.0-ps-20190130.html)
|
||||||
and is FIDO certified. OpenSK supports U2F, and non-discoverable credentials
|
and is FIDO certified. OpenSK supports U2F, and non-discoverable credentials
|
||||||
created with either protocol are compatible with the other.
|
created with either protocol are compatible with the other.
|
||||||
|
|
||||||
If you want to use features of the newer FIDO 2.1, you can try our
|
|
||||||
[develop branch](https://github.com/google/OpenSK/tree/develop). This version is
|
|
||||||
NOT certified and less thoroughly tested though. If you plan to add features to
|
|
||||||
OpenSK, you should switch to develop.
|
|
||||||
|
|
||||||
### :warning: Disclaimer
|
### :warning: Disclaimer
|
||||||
|
|
||||||
This project is **proof-of-concept and a research platform**. It is **NOT**
|
This project is **proof-of-concept and a research platform**. It is **NOT**
|
||||||
@@ -76,28 +66,6 @@ Please check our [Troubleshooting and Debugging](docs/debugging.md) section if y
|
|||||||
have problems with the installation process or during development. To find out what
|
have problems with the installation process or during development. To find out what
|
||||||
else you can do with your OpenSK, see [Customization](docs/customization.md).
|
else you can do with your OpenSK, see [Customization](docs/customization.md).
|
||||||
|
|
||||||
## Research
|
|
||||||
|
|
||||||
We implemented post-quantum cryptography on OpenSK. The code is released under
|
|
||||||
the [hybrid-pqc tag](https://github.com/google/OpenSK/releases/tag/hybrid-pqc).
|
|
||||||
Our [paper](https://eprint.iacr.org/2022/1225) was published in the ACNS
|
|
||||||
Secure Cryptographic Implementation workshop 2023 and won the best paper award.
|
|
||||||
|
|
||||||
<details>
|
|
||||||
<summary>Bibtex reference</summary>
|
|
||||||
|
|
||||||
```
|
|
||||||
@InProceedings{Ghinea2023hybrid,
|
|
||||||
author= {Diana Ghinea and Fabian Kaczmarczyck and Jennifer Pullman and Julien Cretin and Rafael Misoczki and Stefan Kölbl and Luca Invernizzi and Elie Bursztein and Jean-Michel Picod},
|
|
||||||
title= {{Hybrid Post-Quantum Signatures in Hardware Security Keys}},
|
|
||||||
booktitle= {{4th ACNS Workshop on Secure Cryptographic Implementation, Kyoto, Japan}},
|
|
||||||
month= {June},
|
|
||||||
year= {2023},
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
</details>
|
|
||||||
|
|
||||||
## Contributing
|
## Contributing
|
||||||
|
|
||||||
See [Contributing.md](docs/contributing.md).
|
See [Contributing.md](docs/contributing.md).
|
||||||
|
|||||||
Reference in New Issue
Block a user