Given that it will be some years before we have verified modules with
ML-KEM, it seems like P-256 + ML-KEM (as an evolution of P-256 + Kyber)
will have utility for some time, for those who care about validation.

--Richard

On Mon, Jun 3, 2024 at 4:32 PM Bas Westerbaan <bas=
40cloudflare....@dmarc.ietf.org> wrote:

> X25519+ML-KEM will be acceptable for FIPS, just like P-256+Kyber is today.
> We just need to wait for the final standard, and (crucially) for the
> verified modules with ML-KEM.
>
> On Mon, Jun 3, 2024 at 8:56 PM Stephen Farrell <stephen.farr...@cs.tcd.ie>
> wrote:
>
>>
>> I'm afraid I have no measurements to offer, but...
>>
>> On 03/06/2024 19:05, Eric Rescorla wrote:
>> > The question is rather what the minimum set of algorithms we need is. My
>> >   point is that that has to include P-256. It may well be the case that
>> > it needs to also include X25519.
>>
>> Yep, the entirely obvious answer here is we'll end up defining at least
>> x25519+PQ and p256+PQ. Arguing for one but not the other (in the TLS
>> WG) seems pretty pointless to me. (That said, the measurements offered
>> are as always interesting, so the discussion is less pointless than
>> the argument:-)
>>
>> Cheers,
>> S.
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to