D. J. Bernstein wrote:
>Again, I understand that certificates haven't upgraded t allowing Ed25519 yet;

The WebPKI forbids EdDSA and my understanding is that TLS library support is 
lacking [1], but otherwise I don't think there are any problems with using 
EdDSA certificates [2] in general. Ericsson is planning to start using 
EdDSA+PQC hybrids soon. For new systems I think X25519, EdDSA, and SHAKE are 
superior to P-256, ECDSA, and SHA-2. For existing systems it does not make much 
sense to update, especially as most systems need to move to PQC signatures soon.

[1] https://github.com/netty/netty/issues/10916
[2] https://datatracker.ietf.org/doc/html/rfc8410


Loganaden Velvindron wrote:
>My personal view is that it's important to have at least one "independent" 
>curve like X25519

I am very positive to using X25519 as I think it has better properties than 
P-256. I am strongly against the idea that TLS needs an "independent" curve. I 
think the idea that P-256 is backdoored is conspiracy theory nonsense.

I really like Filippo Valsorda’s challenge to recover the seeds. I think NSA 
should take on the challenge and give the bounty to charity. They have the 
capability to win and they should have an interest in increasing trust in the 
P-curves.

https://words.filippo.io/dispatches/seeds-bounty/

Cheers,
John Preuß Mattsson
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to