*Summary:* Experiment with the X25519Kyber768 post-quantum key agreement
mechanism for TLS.

I intend to evaluate the performance characteristics and deployability of a
next-generation cryptosystem called Kyber. Unlike currently deployed
systems, Kyber is believed to be secure against attackers with large
quantum computers. While cryptanalytic-scale quantum computers do not yet
exist, the immediate deployment of a post-quantum key agreement mechanism
will protect our users against "store now, decrypt later" attacks. For the
initial experimentation period, all uses of Kyber will be paired with
X25519 as a risk-minimizing measure.

*Bug:* https://bugzilla.mozilla.org/show_bug.cgi?id=1874959
*Specification:*
https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-03.html
*Standards Body:* IETF, TLS WG
*Platform coverage:* All, after an initial period of desktop-only
evaluation.
*Preference:* security.tls.enable_kyber
*Link to standards-positions discussion: *
https://github.com/mozilla/standards-positions/issues/874
*Other browsers:*
    *Blink: *in developer trial
https://groups.google.com/a/chromium.org/g/blink-dev/c/mniZUff1syc/m/tM5tSne9AwAJ
.
    *WebKit:* not implemented.
*Demo: *https://pq.cloudflareresearch.com/

-- John

-- 
You received this message because you are subscribed to the Google Groups 
"dev-platform@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-platform+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/CAFgAd7EXV5GNB_%2B6%2BAexRqGQOgtvSJwL-%2Bu37Xd1P2Rv%3DK%2Bx9Q%40mail.gmail.com.

Reply via email to