Jan Dušátko writes:
> In my opinion, the verifiability of the place and time of origin needs 
> to be addressed, which is one of the reasons to use DKIM:
> - Ed25519 has a security equivalent of 125b, a little less than the 
> currently required security equivalent 128b (more-less the same)
> - Ed448, like Ed25519, is standardized both within TLS 1.3 and for 
> digital signature thanks to NIST and ETSI

All of those are much stronger than what is needed for authentication
of the sender. Attackers will not be wasting that much resources to
simply generate fake DKIM signatures.

> - RSA should be vulnerable to Shor algorithm (one QFT) in the future
> - ECDSA/EDDSA should be vulnerable to modified Shor algorithm (two QFTs) 
> in the future
> - PQC migration will also need to be addressed in the near future
> It is not a question of how many algorithms there will be, but what 
> algorithms will be involved.

Again we are talking about authentication, not store and decrypt
later. If someone actually generates quantum computer he will not be
wasting computing time to break DKIM, there are much higher value
targets to attack.

Post quantum crypto is needed now when you are encrypting data, and
attackers can store that encrypted data and decrypt it later when they
have quantum computers.

For PQC migration we need to have a algorithm agility, i.e. ability to
add new algorithm in a backward compatible way, i.e., without breaking
any old implementations. I thnk we can already do that as we can use
different algorithms to generate multiple DKIM headers, and new
implementations can ignore the old broken algorithms and only verify
the ones known to be secure, while old implementations will still be
able to verify old algorithms, so there is nothing to be done now for
PQC in DKIM.
-- 
kivi...@iki.fi

_______________________________________________
Ietf-dkim mailing list
Ietf-dkim@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to