Peter C wrote:
>because the motivating example seems to be DTLS
Mobile systems use TLS/TCP, DTLS/UDP, DTLS/SCTP, and QUIC on both standardized 
and vendor-specific interfaces. All of them need to start migrating to PQC 
authentication urgently.

Peter C wrote:
>I think there are still open questions about amplification attacks
The motivating use cases is local networks, where aplification attacks are not 
as big of a worry, and where the owner of the network can configure use of 
Large flight #1 or HRR.

Bas Westerban wrote:
>Sidestepping hybrid standardisation is an advantage, but I'm not yet ready to 
>admit failure there.
For telecom, my view is that hybrid signatures are not mature and will not be 
mature in time to reach 100% PQC signatures in deployments 2030-2035.

David Adrian wrote:
>no one has put forward a grounded-in-reality use case for anything other than 
>SLH-DSA roots of trust.
I don't know why you say that. Both Nokia and Ericsson is saying that SLH-DSA 
would be very practical for our use cases.

David Adrian wrote:
>Finally, in the event this is to be adopted, I should hope that we are able to 
>reduce the number of variants down to one or two, not 12.
I would be fine to only standardize the SHAKE variants. ML-DSA and ML-KEM 
already relies 100% on Keccak. The SHAKE variant are much simpler, and (I 
think) easier to make side-channel resistant. 's' is needed for PKI and 'f' for 
CertificateVerify. I don't know if all security levels are needed. While I 
trust SLH-DSA level 1 more than RSA and ECC, some goverment agencies are for 
unknown and questionable reasons recommending level 3 and above, which is a 
_major_ problem for deployment. I really really hope all recommendations are 
updated to include SLH-DSA level 1.

David Adrian wrote:
>As far as I am aware, there is not a single normative requirement for a hybrid 
>signature in Europe. Even the BSI document [1] that most people cite as 
>support of hybrids is both clearly non-normative (recommendations only), 
>suggesting people _start planning_ and focused primarily on defending against 
>store-now-decrypt-later, where hybrids are already widely deployed.

My understanding is that the European common criteria requirements do not allow 
pure ML-DSA. The recently released European timelines are also focused on 
firmware/software signing, which makes a lot of sense and aligns with CNSA 2.0. 
For TLS signatures the requirements/recommendations are 100% in deployments by 
2030-2035. While 2035 is some time away, 10 years is not much time to 
completely change PKI roots-of-trust. In fact, it is urgent to start yesterday. 
With many security agencies in Europe strongly recommendin g against pure 
ML-DSA, there are many users in Europe that do not think pure ML-DSA is 
acceptable. Something that is not often discussed is that ANSSI (who I think is 
most important player in Europe) has said in the past (e.g. at PKIC) that pure 
ML-DSA will likely be allowed in the future. It would be very good with more 
clarity from European agencies...

David Adrian wrote:
>It also notes that many plans are use-case specific, e.g. just because we have 
>a hybrid kex in TLS, doesn't mean that a pure PQC signature wouldn't also make 
>sense.
Agree, I would like to use X25519MLKEM768 with pure ML-DSA/pure SLH-DSA.

Cheers,
John
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to