Oh I definitely agree there is a deeper problem here. It seems like NIST
wrote something over-restrictive and then folks did a preemptive compliance
maneuver to try to satisfy it. This is not a good way to do protocol
development and hampers what should ultimately have been the goal for
everyone: making TLS a good protocol to secure network communications.

But, regrettable as it is, the damage has been done for X25519MLKEM768 and
we shouldn't change it now. Fixing the underlying problem is for the
future. The compliance schemes should be fixed so that they reflect the
actual security needs here, and there is no reason to have an opinion on
whether any particular compliance scheme's preferred secrets go first or
second. After all, the *entire point* of this hybrid thing is that you
don't have to care about the other input.

On Wed, Oct 23, 2024 at 11:39 AM Joseph Birr-Pixton <jpix...@gmail.com>
wrote:

> On Fri, 18 Oct 2024 at 15:12, Salz, Rich <rsalz=
> 40akamai....@dmarc.ietf.org> wrote:
>
>> To me, this trumps geek esthetics about making things line up.
>>
>
> To be clear, my objection is not aesthetic or even about implementation
> effort. My concern is about rubber-stamping whatever unprincipled things
> that NIST comes up with.
>
> I also agree that altering X25519MLKEM768 (with the now-reversed order
> compared to X25519Kyber768) would be silly at this point -- and I think
> that goes probably for the name too.
>
> Thanks,
> Joe
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to