Tim Hollebeek writes:
  [ regarding "composite and hybrid" ]
> To be clear, the draft says absolutely nothing about either of those
> two topics

To be clear, that's not a good thing. The draft is deviating from the
normal, amply justified security practices regarding PQ deployment. The
resulting security risks are on topic.

> ML-DSA support for TLS is obvious and straightforward.

Concatenated ECC+Dilithium support for TLS is obvious, straightforward,
and less risky than the draft at hand. The counterarguments don't hold
up to examination; see https://blog.cr.yp.to/20240102-hybrid.html.

For dilithium2, keys are 1312 bytes and signatures are 2420 bytes. A
typical ECC signature system adds 32 bytes and 64 bytes respectively.

---D. J. Bernstein

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to