Peter C wrote: >because the motivating example seems to be DTLS Mobile systems use TLS/TCP, DTLS/UDP, DTLS/SCTP, and QUIC on both standardized and vendor-specific interfaces. All of them need to start migrating to PQC authentication urgently.
Peter C wrote: >I think there are still open questions about amplification attacks The motivating use cases is local networks, where aplification attacks are not as big of a worry, and where the owner of the network can configure use of Large flight #1 or HRR. Bas Westerban wrote: >Sidestepping hybrid standardisation is an advantage, but I'm not yet ready to >admit failure there. For telecom, my view is that hybrid signatures are not mature and will not be mature in time to reach 100% PQC signatures in deployments 2030-2035. David Adrian wrote: >no one has put forward a grounded-in-reality use case for anything other than >SLH-DSA roots of trust. I don't know why you say that. Both Nokia and Ericsson is saying that SLH-DSA would be very practical for our use cases. David Adrian wrote: >Finally, in the event this is to be adopted, I should hope that we are able to >reduce the number of variants down to one or two, not 12. I would be fine to only standardize the SHAKE variants. ML-DSA and ML-KEM already relies 100% on Keccak. The SHAKE variant are much simpler, and (I think) easier to make side-channel resistant. 's' is needed for PKI and 'f' for CertificateVerify. I don't know if all security levels are needed. While I trust SLH-DSA level 1 more than RSA and ECC, some goverment agencies are for unknown and questionable reasons recommending level 3 and above, which is a _major_ problem for deployment. I really really hope all recommendations are updated to include SLH-DSA level 1. David Adrian wrote: >As far as I am aware, there is not a single normative requirement for a hybrid >signature in Europe. Even the BSI document [1] that most people cite as >support of hybrids is both clearly non-normative (recommendations only), >suggesting people _start planning_ and focused primarily on defending against >store-now-decrypt-later, where hybrids are already widely deployed. My understanding is that the European common criteria requirements do not allow pure ML-DSA. The recently released European timelines are also focused on firmware/software signing, which makes a lot of sense and aligns with CNSA 2.0. For TLS signatures the requirements/recommendations are 100% in deployments by 2030-2035. While 2035 is some time away, 10 years is not much time to completely change PKI roots-of-trust. In fact, it is urgent to start yesterday. With many security agencies in Europe strongly recommendin g against pure ML-DSA, there are many users in Europe that do not think pure ML-DSA is acceptable. Something that is not often discussed is that ANSSI (who I think is most important player in Europe) has said in the past (e.g. at PKIC) that pure ML-DSA will likely be allowed in the future. It would be very good with more clarity from European agencies... David Adrian wrote: >It also notes that many plans are use-case specific, e.g. just because we have >a hybrid kex in TLS, doesn't mean that a pure PQC signature wouldn't also make >sense. Agree, I would like to use X25519MLKEM768 with pure ML-DSA/pure SLH-DSA. Cheers, John
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org