Yes, we need SecP384 hybrids.

More generally, I see two separate hybrid key exchange drafts under discussion 
in the TLS WG:
- draft-ietf-tls-hybrid-design-10 refers to pre-standard Kyber;
- draft-kwiatkowski-tls-ecdhe-mlkem-01 defines hybrids with ML-KEM 768.

Both drafts are on the Informational track. Do we really need two separate 
documents? Also, shouldn't this work be on the Standards track?

Cheers,

Andrei

-----Original Message-----
From: Alicja Kario <hka...@redhat.com>
Sent: Friday, September 6, 2024 4:40 AM
To: Kris Kwiatkowski <k...@amongbytes.com>; tls@ietf.org
Subject: [EXTERNAL] [TLS] draft-kwiatkowski-tls-ecdhe-mlkem and P-384

Hello,

What's the situation with other groups for TLS 1.3?
Specifically, are there any plans to specify SecP384r1MLKEM1024?

As mentioned in multiple emails already, high security system already have a 
strict requirement to use P-384 curve exclusively.
Similarly, for post-quantum resistance they will be required to use ML-KEM-1024.

Will you add it to the draft, or should we start work on a separate one that 
defines those hybrid algorithms?
--
Regards,
Alicja (nee Hubert) Kario
Principal Quality Engineer, RHEL Crypto team
Web: http://www.cz.redhat.com/
Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to