> I think this PR should mention risks introduced by hybrid solutions as well 
> – which (obviously) differ from those introduced by non-hybrid.

Mentioning them is certainly a good idea. Perhaps it makes sense to be specific 
as to what is compared:

- I would consider hybrid methods beyond ietf-tls-ecdhe-mlkem (or whatever the 
WG decides is the best way to combine ML-KEM with a traditional KEX in the 
specific context of TLS) out of scope.
- Potential drawbacks of ietf-tls-ecdhe-mlkem are best discussed within that 
document, as they represent securiy considerations for *any* potential 
implementers of that document. For instance, the fact that a memory safety 
issue in one KEX algorithm can affect the security of the entire program, 
whereas the effect of timing leakage is (should be?) limited to the specific 
KEX algorithm.
- Insofar as we believe those reasons to be sufficient for switching to 
non-hybrids (at least in some contexts), draft-ietf-tls-mlkem should mention 
these contexts in the listing in the security considerations.

Would this address your concerns adequately?

-- TBB

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to