On Wed, Sep 09, 2015 at 09:44:23PM -0400, Paul Wouters wrote:

> >>Once the CFRG algorithms are done, I would also publish an updated
> >>list of MTI algorithms for DNSSEC that would consist of:
> >>
> >>    8, 12 and both of the CFRG algorithms.
> 
> You listed 12 as both deprecate and MTI ?

Sorry, typo, I meant 13 as MTI not 12.

> >>The more secure of the two CFRG algorithms should be supported by
> >>clients, but should not yet be used by servers, concerns about
> >>post-QC crypto don't really apply to short-term signatures
> 
> I thought the whole point of QC was that it makes key discovery
> a trivial short brute force. It would be especially useful for
> short term signatures that otherwise couldn't have been broken in
> time (although I guess if you have QC, you do the root key first.

My point is that once a DNSSEC KSK or ZSK is changed, there is no
issue with disclosure.  The keys are used for signing only.  So we
don't need to worry about QC now.  We can replace any weak keys
once quantum computers are reasonably expected to be available to
adversaries.

-- 
        Viktor.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to