Hi,

Isn't this off-topic? The IETF can't stop you from having a meeting, but
you're crossing the line by using IETF lists to advertise it.

thanks,
Rob


On Thu, Feb 27, 2025 at 11:08 PM John Mattsson <john.mattsson=
40ericsson....@dmarc.ietf.org> wrote:

> Hi,
>
>
>
> There was significant interest from several countries to have a
> side-meeting on PQC at IETF 122 Bangkok, so Ericsson will organize such a
> meeting on Monday 17 March 15.15 - 16.45 Bangkok time in Meeting Room 2
> [40 seats] (overlapping with Monday Session III). It is possible to
> attend remotely.
>
> https://trello.com/c/nH9exeWo
>
>
>
> Potential discussion topics are listed below. There might be a few short
> presentations to foster discussion, but the plan is to focus on dialogue
> and discussion between people in the IETF and government stakeholders.
>
>
>
> Cheers,
>
> John Preuß Mattsson
>
> Expert, Cryptographic Algorithms and Security Protocols, Ericsson
>
>
> Description
>
> *Time*: 15:15-16:45
> *Meeting Title:* PQC Dialogue with Government Stakeholders
> *IETF Webex:* https://ietf.webex.com/meet/ietfsidemeeting2
> *Meeting Organizer*: John Preuß Matsson, Ericsson and Alexander Engström,
> NDRE
> *Email address*: john.matts...@ericsson.com
>
> *Meeting Description*: Potential discussion topics:
>
>    - Recommended PQC algorithms (KEMs and signatures)
>    o ML-KEM, ML-DSA, SLH-DSA, FN-DSA, Classic McEliece, FrodoKEM,
>    BIKE/HQC, XMSS/LMS, …
>    o Security category 1,2,3,4,5? Does it depend on algorithm and use
>    case?
>    - Timelines for PQC migration
>    o When should migration begin? When will it be required?
>    o Does it depend on user, use case, protection lifetime, hardware vs
>    software, migration complexity, value of the protected node and data,
>    scheduled hardware replacement, etc.?
>    - Hybridization or standalone PQC
>    o Difference between KEMs and Signatures
>    o Differences between algorithms (e.g., lattice-based vs. hash-based)
>    o Differences between use cases (e.g., confidentiality vs.
>    authentication)
>    o Is hybridization a short-term necessity or a long-term strategy?
>    - Hybridization of PQC KEMs
>    o Single vs. multiple PQC algorithms? Role of symmetric keys?
>    o KEM combiners: general-purpose vs. optimized designs
>    o Which traditional curves? X25519/X448, NIST P-curves, Brainpool, …
>    - Hybridization of signatures
>    o Role of symmetric keys?
>    o Signature combiners, general or optimized?
>    o Desired properties: SUF-CMA? Other security properties?
>    o Which traditional signatures? EdDSA, ECDSA, RSA?
>    - KDF and hash functions
>    o ML-KEM and ML-DSA mandate SHA-3.
>    o Time to move away from SHA-2/HMAC/HKDF/MGF?
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to