The problem with the argument “X trusts Kyber, so we don’t need hybrid” (where X can be “NIST” or “the speaker”) is that trust, like beauty, is in the eye of the beholder. Just because NIST (or any other third party) is comfortable with just using Kyber (or Dilithium) does not mean that everyone does.
As long as there are a number of users that don’t quite trust fairly new algorithms, there will be a valid demand for using those new algorithms with older ones (which aren’t postquantum, but we are moderately confident that are resistant to conventional cryptanalysis). From: TLS <tls-boun...@ietf.org> On Behalf Of Watson Ladd Sent: Monday, November 6, 2023 2:44 PM To: Kris Kwiatkowski <k...@amongbytes.com> Cc: Bas Westerbaan <bas=40cloudflare....@dmarc.ietf.org>; TLS List <TLS@ietf.org> Subject: Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms? Why do we need FIPS hybrids? The argument for hybrids is that we don't trust the code/algorithms that's new. FIPS certification supposedly removes that concern so can just use the approved PQ implementation.
_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls