On Fri, Aug 5, 2022 at 8:16 PM Sofía Celi <cheren...@riseup.net> wrote:

Thanks for looking at this.

...
> Completely agree. This is also the case for DNSSEC, for example. We
> don't have a proper mapping of those operational issues. We have started
> research on the matter so if you are interested in contributing, let us
> know.
>

Unless we get a scheme that allows for signatures of 200 bytes or less, we
are really, really going to have to redesign the DNS protocol and DNSSEC
architecture because trying to do DNSSEC with signatures that don't fit in
an ethernet frame is a non-starter.

The way I would do it is to use structured cryptography, that is a single
signature per zone over a Merkle tree of the individual records.

Pruning the digests to 256 bits presents an acceptable work factor and only
costs 32.log2(n) bytes where n is the number of records in the zone.


> > I am now thinking in terms of 'Post Quantum Hardened" and "Post Quantum
> > Qualified". Hardening a system so it doesn't completely break under QCC
> > is a practical near term goal. Getting to a fully qualified system is
> > going to be a root-and-canal job.
>
> There is a notion of being 'quantum annoyant' to a quantum computer:
> perhaps that might be an starting point for other schemes that do no
> have a post-quantum counterpart as of right now. For others, a hybrid
> approach should definitly be taken such that classical cryptography
> still protects data.
>

I am using PQC to protect the data and Threshold-ECC to protect the data
with separation of roles.

> The term 'interactive' is used very differently in protocol design and
> > cryptography. DH and ECDH are mutual key exchanges. Alice and Bob both
> > receive a shared secret that both contribute to equally. Kyber is a
> > unilateral key exchange, Alice encrypts to Bob's public key without
> > using her key. If we want to have a mutually authenticated key exchange,
> > Bob is going to have to encrypt something to Alice's public key.
>
> That is correct. Such is the way KEMs work. We don't have that
> counterpart in post-quantum that we can attest to a high level of
> security. This is not so evidently needed in TLS but it is on Signal,
> OTR, and other protocols. I recently sent an email to the pqc mailing
> list around the matter:
> https://mailarchive.ietf.org/arch/msg/pqc/mW1r-57_OX7kAMGPef3noC4ZF_E/


While DH does in theory allow Alice and Bob to establish a shared secret
directly using a mutual key agreement, that is not an approach I have ever
wanted to use. It means we end up using the same primary key for our key
agreement. That just feels dirty to me. I prefer to do two unilateral
exchanges and concatenate the results to get the input to the KDF which is
how Noise/Signal is doing things for the two party interaction case.

Given the use case is human-human interaction and given all the other
latency in the call setup, I have a really really hard time seeing multiple
round trips for a forward secrecy rekey. Furthermore, Signal is a closed
infrastructure, you can only use the Signal servers and the Signal client.
So I am also having a hard time seeing how their problem is our problem or
how backwards compatibility is a concern. One of my pet peeves in Signal is
in fact their nanny knows best insistence on me constantly updating their
client.


When you said 'interactive protocol', what I thought you were saying is
that Kyber requires the multiple round trips some of the early Zero
Knowledge protocols required.


PHB
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to