>
> I think there is a companion point to be made.  I suggest:
>
>    Implementations must use a ciphersuite that includes a symmetric
>    encryption algorithm with sufficiently large keys.  For protection
>    against the future invention of a CRQC, the symmetric key needs to be
>    at least 256 bits.
>

Not true.128 bit symmetric keys are fine for PQ.

Right, I think that means that ECH as-is can be used, but in the face
> of a CRQC, ECH as-is won't protect against the leakage about which
> John was concerned.


Not true. ECH, as-is, can be configured to use a PQ KEM. (Whether it's
deployable, and whether its performance is acceptable, is something we
should figure out.)

 Best,

 Bas
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to