I’m surprised to see that there isn’t much (isn’t any?) discussion of the 
AuthKEM draft. 

 

It seems pretty obvious that with the advent of PQ algorithms, the sheer sizes 
of signatures and public keys would make {cDm}TLS existing authentication and 
key exchange impractical in bandwidth-constrained environments, especially when 
higher security-level algorithms (like, what’s demanded by CNSA-2.0) are 
required.

 

Thus, implicit authentication (think – MQV, Hugo Krawczyk’s HMQV, etc.) seems 
to be a-must for making the PQ impact on bandwidth somewhat manageable.

 

I would like this WG to resurrect the AuthKEM draft.

 

I can’t be in Yokohama, and am not fanatical enough to spend nights on XMPP or 
such. But hopefully, we can discuss AuthKEM approach here on the list.

 

Thank you!

--

V/R,

Uri Blumenthal                              Voice: (781) 981-1638 

Secure Resilient Systems and Technologies   Cell:  (339) 223-5363

MIT Lincoln Laboratory                      

244 Wood Street, Lexington, MA  02420-9108      

 

Web:     https://www.ll.mit.edu/biographies/uri-blumenthal

Root CA: https://www.ll.mit.edu/llrca2.pem

 

There are two ways to design a system. One is to make it so simple there are 
obviously no deficiencies.

The other is to make it so complex there are no obvious deficiencies.

                                                                                
                                                     -  C. A. R. Hoare

 

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to