On Mon, Nov 11, 2024 at 12:51 PM Michael Richardson <mcr+i...@sandelman.ca>
wrote:

>
> Christian Huitema <huit...@huitema.net> wrote:
>     > To summarize, the QUIC handshake will require an extra RTT:
>
>     > * if the server flight is larger than 3 times the Client Hello,
>     > * if the Client Hello is larger than 12,000 bytes,
>     > * if the Server Hello is larger than 12,000 bytes.
>
>     > If would be very nice to have PQC variants that fit inside that
> budget.
>
> might it be worth doing a "legacy" crypto operation first, even if that is
> broken by a CRQC, if the time to break it is less than the RTT?
>

The attacker has more time than just the RTT: you can perform a key
recovery on any of the classical signatures within their validity time, and
have the recovered private key ready to go for the next active attack.

A proposal in similar spirit would be to keep using classical signatures
for leaf and/or intermediate certificates, but reduce their validity time
significantly. You still need a PQ signature from the root. Thus in the
end, the saving would be similar as pursuing intermediate elission, but
it's much more frail.

Stepping back, I'm uncomfortable with the "quantum computers will take a
long time to break a single key". That'll be the case for the first key
broken. However, we need continued exponential progress in quantum
computing if we are to reach a CRQC in our lifetimes. It'd be strange to
expect that progress stops then.

Best,

 Bas



>
> --
> Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-                      *I*LIKE*TRAINS*
>
>
>
> --
> Pqc mailing list -- p...@ietf.org
> To unsubscribe send an email to pqc-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to