On Wed, Feb 25, 2026 at 09:38:59PM +0000, Blumenthal, Uri - 0553 - MITLL wrote:
> > Admittedly your answer (reported here below) was not addressing my concerns.
> 
>  > . . . . .
> 
> > A hybrid still has a chance of being secure if old good crypto would be
> > successfully attacked, so your argument does not stand. 
> 
> Let me repeat myself. If the data must remain secure for a long time, then the
> Classic part does not help, and the security of that data lies solely within
> the PQ component.  Which part of this “does not stand”?
> 
> 
> The only difference the Classic part makes is probably preventing the data 
> from
> being compromised early — which for long-time-valuable data is not enough. 
> 
I agree that it's nothing to rest on but even then it does make attacks
more expensive as the ECC keys are ephemeral.

> (This extra protection usually does not hurt, but in several use cases it does
> not help, and it adds the cost of introducing extra complexity in codebase and
> infrastructure management. For some — it is OK, so there’s tls-ecdhe-mlkem
>  draft, that nobody objects to. For others — it is not OK, their needs are
> addressed by tls-mlkem.)
> 
One problem with this draft is exactly that the motivation is still lacking.
What is an example of these "others" that need the ML-KEM key be fully exposed? 

> > To build confidence in RSA took 20 years or more. I do not expect that PQC
> > will have such a remarkably different path.  
> 
> You must have missed one of my previous emails — let me (again) repeat myself:
> 
> System            Standardized                                     
>         Proposed               Lag-to-Standardization 
> Math-Studied-For-How-Long
> RSA       1977     ~1993–1995    ~15–20 years            Number theory: 2000+
>                                                       years
> ECC       1985     ~1998–2000    ~13–15 years            Elliptic curves: ~150
>                                                       years
> Lattice   1996      2022–2024    ~25 years               Lattices: ~150–200
> crypto                                                years
> 
>  McEliece       1978       2024        ~46 years                Codes:  
>  ~60-75 years
> 
> I hope this table is self-explanatory, and addresses your comment.
>
Just pointing to the time that has passed misses (at least) two important
aspects
* Lattice-based crypto has been marred by patents since the beginning. While it
  was fun to attack NTRU in particular because it was patented, this status did
  slow down a lot of the research. It was not long before the NIST competition
  started (and before the NTRU patent would have expired anyways) that they
  removed the restrictions.
* We see in cryptanalysis results that we haven't reached stability, yet.
  That's why I recommend to use level 3 and up, and ideally level 5, to have
  some security margin, and of course to combine with ECC.

ECC security was stable for a long time before wide-spread adoption started in
the mid 2000s. The main change was that there had been a patent deal between
Certicom and the NSA that made using ECC possible, that some research managed
to route around the patents (which e.g. led to the Brainpool curves), and that
some patents expired. In the ECC case the enhanced interest didn't do any
damage to curves over prime fields, but we saw a lot happening for composite
fields.

So, the table only works if you need to convince your management but the
implied argument does not hold.

Regards
        Tanja

P.S. Out of curiosity, where did you see McEliece standardized in 2024?

All the best
        Tanja

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to