FWIW and probably not relevant, DoD CAC has never used DSA.

FORTEZZA used DSA.

-----Original Message-----
From: Alicja Kario [mailto:hka...@redhat.com] 
Sent: Monday, December 9, 2024 2:23 PM
To: D. J. Bernstein <d...@cr.yp.to>
Cc: tls@ietf.org
Subject: [TLS] Re: draft-connolly-tls-mlkem-key-agreement

On Saturday, 7 December 2024 23:32:03 CET, D. J. Bernstein wrote:
> Watson Ladd writes:
>> Having MLKEM without a hybrid as an option in TLS when the 
>> interoperable choice is a hybrid
>
> Some previous messages claim that there's a split between customers 
> demanding hybrids and customers demanding non-hybrids so "we'll end up 
> standardizing both". If the claim is true (I'm skeptical about the 
> non-hybrid part) and IETF acts on it (which is what I'm objecting to), 
> then how exactly does a hybrid end up as "the interoperable choice"?

same way that when DOD CAC was using DSA, long after no commercial CA was using 
DSA, the public Internet servers that would accept those CAC's were perfectly 
happy using RSA server keys so that regular browsers were able to connect to 
them, even without use of a CAC

If no browser will implement pure ML-KEM (and it very much looks so), then they 
will have to provide support for secp256r1MLKEM768 group to allow connections 
from regular browsers: hybrids will be the interoperable choice
--
Regards,
Alicja (nee Hubert) Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to