Yes , Hybrid is weaker because it contributes little/nothing[1] to cryptographic security and increases attack surface by adding another code base. 

[1] The only case when Hybrid helps is when both CRQC is not a threat **and** PQ algorithms falls to a classic attack (like SIKE). Thus, deploying hybrid because you want to protect your date against “harvest now, decrypt later” Quantum attack is a non-starter. And that attack is the main reason people are hustling now, rather than wait for several more years. 
Regards,
Uri

Secure Resilient Systems and Technologies
MIT Lincoln Laboratory

On Oct 10, 2025, at 16:19, Deirdre Connolly <[email protected]> wrote:


If you are fine with ML-KEM, you should be able to use it on its own. That's it. On Fri, Oct 10, 2025, 4: 17 PM Rob Sayre <sayrer@ gmail. com> wrote: Hi, Alright, but that's the issue. I hope we can stick to that point. "migrating
ZjQcmQRYFpfptBannerStart
This Message Is From an External Sender
This message came from outside the Laboratory.
 
ZjQcmQRYFpfptBannerEnd
If you are fine with ML-KEM, you should be able to use it on its own. That's it.

On Fri, Oct 10, 2025, 4:17 PM Rob Sayre <[email protected]> wrote:
Hi,

Alright, but that's the issue. I hope we can stick to that point.

"migrating beyond hybrids and for users that need to be fully post-quantum."

Where does the need to be solely PQ arise? Is it weaker in some way to use a hybrid?

thanks,
Rob


On Fri, Oct 10, 2025 at 1:10 PM Deirdre Connolly <[email protected]> wrote:

On Fri, Oct 10, 2025 at 4:07 PM Rob Sayre <[email protected]> wrote:
Hi,

That does not answer my question: why?

The hybrid draft has a rationale:


thanks,
Rob

On Fri, Oct 10, 2025 at 1:02 PM Deirdre Connolly <[email protected]> wrote:
The drafts and the profile currently do not make Recommendations or MTI's, they make the options available; ekr has now raised promoting one hybrid option as Recommended = Y. Not everyone can or should use the same options, we have a diversity of curves for example

On Fri, Oct 10, 2025 at 3:56 PM Rob Sayre <[email protected]> wrote:
On Fri, Oct 10, 2025 at 12:33 PM Deirdre Connolly <[email protected]> wrote:
CNSA 2.0 does not support hybrids in general, and their TLS profile only supports ML-KEM-1024: https://datatracker.ietf.org/doc/draft-becker-cnsa2-tls-profile/

Hi,

But why is that? See this thread from the IETF general list:


As pointed out in that thread, all of these drafts seem to conflict with the rationale in draft-ietf-tls-hybrid-design.

thanks,
Rob

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to