On Tue, Mar 25, 2025, at 02:37, Eric Rescorla wrote:
> 1. Getting PQ resistance for free even with non-PQ PAKEs.
> 2. Reducing the combinatoric explosion of "groups"

I don't know that you are really getting PQ resistance if your PAKE remains 
vulnerable.  You might maintain confidentiality for that single connection, but 
if there is a possibility of impersonation (are you relying on the PAKE for 
authentication of the server?) then you lose.

Avoiding the combinatoric problem seems like a pretty high complexity tax.  
Sure, we are already in the position where we have N (number of ECC groups) x M 
(number of PQ groups) groups.  Adding a PAKE makes that N x M x P (number of 
PAKEs).  However, these are all small numbers.  Building a parallel extension 
is relatively straightforward if you model it like key exchange and use the 
obvious combiner.  But then, why did we not do that with PQ as well?

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to