On Tue, Mar 25, 2025, at 02:37, Eric Rescorla wrote: > 1. Getting PQ resistance for free even with non-PQ PAKEs. > 2. Reducing the combinatoric explosion of "groups"
I don't know that you are really getting PQ resistance if your PAKE remains vulnerable. You might maintain confidentiality for that single connection, but if there is a possibility of impersonation (are you relying on the PAKE for authentication of the server?) then you lose. Avoiding the combinatoric problem seems like a pretty high complexity tax. Sure, we are already in the position where we have N (number of ECC groups) x M (number of PQ groups) groups. Adding a PAKE makes that N x M x P (number of PAKEs). However, these are all small numbers. Building a parallel extension is relatively straightforward if you model it like key exchange and use the obvious combiner. But then, why did we not do that with PQ as well? _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org