> [ regarding encryption vs. signatures: ]
>> There’s no damage possible (at least, in the TLS context) caused by PQ
>> DSA break
>
> Not true. I already explained what's wrong with this argument:
> https://mailarchive.ietf.org/arch/msg/tls/77uUYhGJYNVQIp9heMY9bkbKbaA/ 
> <https://mailarchive.ietf.org/arch/msg/tls/77uUYhGJYNVQIp9heMY9bkbKbaA/>


Sorry, I can’t accept the answer you’re giving. Your argument basically is 
comprised of two parts: 

1. If a PQ DSA break happens, reverting back to ECC would take time, and 
2. A PQ attack may not come to public attention (for some time?), leaving 
people with (only) PQ vulnerable. 
To (1) – then don’t move to PQ DSA until either CRQC is announced, or you’re 
certain “enough” (in whatever is your definition of “enough”) that PQ DSA is 
strong/resilient “enough”. 
To (2) – what makes you think there’s no ECC attack that simply hasn’t been 
announced yet? Perhaps, your whole reliance on ECC is misplaced? 





Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to