Hi,

There was significant interest from several countries to have a side-meeting on 
PQC at IETF 122 Bangkok, so Ericsson will organize such a meeting on Monday 17 
March 15.15 - 16.45 Bangkok time in Meeting Room 2 [40 seats] (overlapping with 
Monday Session III). It is possible to attend remotely.
https://trello.com/c/nH9exeWo

Potential discussion topics are listed below. There might be a few short 
presentations to foster discussion, but the plan is to focus on dialogue and 
discussion between people in the IETF and government stakeholders.

Cheers,
John Preuß Mattsson
Expert, Cryptographic Algorithms and Security Protocols, Ericsson

Description

Time: 15:15-16:45
Meeting Title: PQC Dialogue with Government Stakeholders
IETF Webex: https://ietf.webex.com/meet/ietfsidemeeting2
Meeting Organizer: John Preuß Matsson, Ericsson and Alexander Engström, NDRE
Email address: john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>

Meeting Description: Potential discussion topics:

  *   Recommended PQC algorithms (KEMs and signatures)
o ML-KEM, ML-DSA, SLH-DSA, FN-DSA, Classic McEliece, FrodoKEM, BIKE/HQC, 
XMSS/LMS, …
o Security category 1,2,3,4,5? Does it depend on algorithm and use case?
  *   Timelines for PQC migration
o When should migration begin? When will it be required?
o Does it depend on user, use case, protection lifetime, hardware vs software, 
migration complexity, value of the protected node and data, scheduled hardware 
replacement, etc.?
  *   Hybridization or standalone PQC
o Difference between KEMs and Signatures
o Differences between algorithms (e.g., lattice-based vs. hash-based)
o Differences between use cases (e.g., confidentiality vs. authentication)
o Is hybridization a short-term necessity or a long-term strategy?
  *   Hybridization of PQC KEMs
o Single vs. multiple PQC algorithms? Role of symmetric keys?
o KEM combiners: general-purpose vs. optimized designs
o Which traditional curves? X25519/X448, NIST P-curves, Brainpool, …
  *   Hybridization of signatures
o Role of symmetric keys?
o Signature combiners, general or optimized?
o Desired properties: SUF-CMA? Other security properties?
o Which traditional signatures? EdDSA, ECDSA, RSA?
  *   KDF and hash functions
o ML-KEM and ML-DSA mandate SHA-3.
o Time to move away from SHA-2/HMAC/HKDF/MGF?
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to