ZjQcmQRYFpfptBannerEnd 

I happen to think that standalone ML-DSA in TLS is a controversial issue. 

And I respectfully disagree. As been pointed out already, you cannot 
authenticate tomorrow on somebody else yesterday’s connection. 



In practice, PQ authentication is not an immediate issue in a sense of "record 
now, decrypt later". 

Exactly. Except that my conclusion from this is – no hybrid is necessary. 
Either move to PQ, or remain with Classic and keep observing/studying PQ. 


There is also an issue of what signatures in X.509 certs will look like. 
Especially in CA certificates, these may favor ML-DSA+ECC v.s. ML-DSA, so there 
would need to be support by TLS stack for the hybrid for that reason. 

This all is based on the assumption that ML-DSA would fail, but ECC won’t. I 
find this highly improbable. 






Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to