How about having x448mlkem1024 allocated as an experimental codepoint
for those who
wish to use it ?


On Mon, 6 Jan 2025 at 12:52, Viktor Dukhovni <ietf-d...@dukhovni.org> wrote:
>
> On Mon, Jan 06, 2025 at 08:00:04AM +0000, Kris Kwiatkowski wrote:
> > On 06/01/2025 06:18, Viktor Dukhovni wrote:
> > > it would be very unlikey to get
> > > used.
> > The addition of that codepoint was previously discussed on this mailing
> > list, and as Victor says,
> > it is unlikely to be used.
>
> Sure, but for the record the same applies to SecP3841MLKEM1024, which is
> slower still and also not especially compelling.  A more complete table:
>
>                                keygen    encaps    decaps keygens/s  encaps/s 
>  decaps/s
>                  ML-KEM-768 0.000027s 0.000017s 0.000027s   36852.5   57951.3 
>   36580.9
>                 ML-KEM-1024 0.000042s 0.000023s 0.000036s   23865.3   43257.8 
>   27478.9
>              X25519MLKEM768 0.000054s 0.000071s 0.000056s   18638.2   14051.3 
>   17725.6
>           SecP256r1MLKEM768 0.000042s 0.000076s 0.000075s   23747.7   13224.7 
>   13406.0
>               X448MLKEM1024 0.000226s 0.000337s 0.000172s    4427.6    2967.8 
>    5807.0
>          SecP384r1MLKEM1024 0.000690s 0.001292s 0.000674s    1449.2     773.9 
>    1483.9
>
> Though it looks a bit  better with the GCC 128-bit arithmetic
> optimisations (OpenSSL's "enable-ec_nistp_64_gcc_128") enabled:
>
>          SecP384r1MLKEM1024 0.000176s 0.000495s 0.000362s    5673.4    2022.1 
>    2763.8
>
> --
>     Viktor.
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to