> This is misleading. There are many implementations of Kyber that require  
> much less memory. See eg [1] from 2019 where Kyber-512 only requires 2736  
> bytes.

Thank you. Somehow I missed this, although the use of a reference 
implementation seemed suspicious.

> By the way, for key agreement, between keygen and decapsulation, a client  
> only needs to keep around the private key seed (64 bytes).

This actually emphasizes the point.
For any ML-KEM capable device, we are still talking about a minimum RAM of at 
least two KB (ignoring significant future optimizations). Moreover, much of 
that memory is unused outside of ML-KEM operations.
Then:

1. The unused memory should suffice to perform X25519, and therefore
2. Limited RAM is quite unlikely to be the bottleneck when choosing between 
ML-KEM and a hybrid.

-- TBB

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to