I support moving forward with hybrids as a proactively safe deployment
option. I think that supporting
only Kyber for KEX  is not enough. It would make sense to have more options.

Google uses NTRU HRSS internally:
https://cloud.google.com/blog/products/identity-security/why-google-now-uses-post-quantum-cryptography-for-internal-comms

If Google decides to use this externally, how easy would it be to get
a codepoint for TLS ?


On Tue, 7 Nov 2023 at 12:30, Scott Fluhrer (sfluhrer)
<sfluhrer=40cisco....@dmarc.ietf.org> wrote:
>
> The problem with the argument “X trusts Kyber, so we don’t need hybrid” 
> (where X can be “NIST” or “the speaker”) is that trust, like beauty, is in 
> the eye of the beholder.  Just because NIST (or any other third party) is 
> comfortable with just using Kyber (or Dilithium) does not mean that everyone 
> does.
>
>
>
> As long as there are a number of users that don’t quite trust fairly new 
> algorithms, there will be a valid demand for using those new algorithms with 
> older ones (which aren’t postquantum, but we are moderately confident that 
> are resistant to conventional cryptanalysis).
>
>
>
> From: TLS <tls-boun...@ietf.org> On Behalf Of Watson Ladd
> Sent: Monday, November 6, 2023 2:44 PM
> To: Kris Kwiatkowski <k...@amongbytes.com>
> Cc: Bas Westerbaan <bas=40cloudflare....@dmarc.ietf.org>; TLS List 
> <TLS@ietf.org>
> Subject: Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?
>
>
>
> Why do we need FIPS hybrids? The argument for hybrids is that we don't trust 
> the code/algorithms that's new. FIPS certification supposedly removes that 
> concern so can just use the approved PQ implementation.
>
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to