MLKEM1024 is the CNSA 2.0 approved key exchange
https://www.ietf.org/archive/id/draft-becker-cnsa2-tls-profile-00.html 
<https://www.ietf.org/archive/id/draft-becker-cnsa2-tls-profile-00.html> 

Yes. 

secp384r1 is the CNSA 1.0 approved key exchange
https://www.rfc-editor.org/rfc/rfc9151.html 
<https://www.rfc-editor.org/rfc/rfc9151.html> 

Yes. 

If SecP3841MLKEM1024 is CNSA 1.0 compliant (treating MLKEM102 like a 
non-security part), then X25519MLKEM768 is CNSA 2.0 compliant (treating X25519 
like a non-security part). 

No. MLKEM768 is not allowed by CNSA-2.0. Only MLKEM1024. 


From: Bas Westerbaan <bas=40cloudflare....@dmarc.ietf.org>
Date: Monday, 6 January 2025 at 11:18
To: Kris Kwiatkowski <k...@amongbytes.com>
Cc: tls@ietf.org <tls@ietf.org>
Subject: [TLS] Re: draft-kwiatkowski-tls-ecdhe-mlkem and x448 

Didn't CNSA 2 only allow hybrids if there is no alternative? There is a 
codepoint for MLKEM1024 in TLS now. 


On Mon, Jan 6, 2025 at 9:57 AM Kris Kwiatkowski <k...@amongbytes.com 
<mailto:k...@amongbytes.com>> wrote: 

Sure, but for the record the same applies to SecP3841MLKEM1024 I think the main 
motivation for ECDH/P-384 is CNSA compliance, so I don't think it is "the same 
applies". Yes, 
it is slower than x25519 or ECDH/p256. 

_______________________________________________
TLS mailing list -- tls@ietf.org <mailto:tls@ietf.org>
To unsubscribe send an email to tls-le...@ietf.org <mailto:tls-le...@ietf.org> 









Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to