On Wed, Nov 20, 2024 at 6:06 AM D. J. Bernstein <d...@cr.yp.to> wrote:
> > https://web.archive.org/web/20240925031754/https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF > includes the following note: "Even though hybrid solutions may be > allowed or required due to protocol standards, product availability, or > interoperability requirements, CNSA 2.0 algorithms will become mandatory > to select at the given date, and selecting CNSA 1.0 algorithms alone > will no longer be approved." > > This looks 100% compatible with a TLS WG decision saying "PQ in TLS has > to be hybrid". Without addressing the question of what CNSA 2.0 requires, I don't think the TLS WG making that decision is really on the table here. As a reminder, the relevant TLS registry ( https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-8 ) operates under an "Expert Review" policy with the standard being quite low. Note: The role of the designated expert is described in RFC 8447 <https://www.rfc-editor.org/rfc/rfc8447>. The designated expert [RFC8126 <https://www.rfc-editor.org/rfc/rfc8126>] ensures that the specification is publicly available. It is sufficient to have an Internet-Draft (that is posted and never published as an RFC) or a document from another standards body, industry consortium, university site, etc. The expert may provide more in-depth reviews, but their approval should not be taken as an endorsement of the supported group. So, the question isn't so much whether a given algorithm can be used with TLS but rather (1) whether the WG adopts it (2) whether it's standards track, (3) whether we mark it Recommended and (4) whether it's mandatory to implement. We certainly could mark ML-KEM Recommended=N (or even D), but the policy isn't to forbid code point registration just because we don't have confidence in the algorithm; I don't think we should change that in this case. -Ekr
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org