On Sat, Feb 22, 2025 at 07:06:49AM +0000, Geoff Huston wrote:

> So firstly let me quickly recap my understanding of the issues with
> the need for PQC. AS I noted to ekr a day ago I can't find the NIST
> document  thought I has seen this.
> 
> However the state of the art of quantum computation capability today
> is up to finding the prime factots of 21, so if your required lifetime
> of integrity of secrecy is, say one month, then its hard to support
> the case that you need to use PQC right now.

The source of the confusion in this thread appears to be the use of the
word "integrity" in the construct "integrity of secrecy".  This is
because in communications security it is common to distinguish between
data *integrity* (resistance to tampering with the content) and
*privacy* (resistance to interception and decryption, though sometimes
also overlapping with traffic analysis to discover who's communicating
with whom, without content recovery).

In that light "integrity of secrecy" is a somewhat unfortunate choice
of words.  Though not a major problem, once the intent is understood.

> So if the sense of the advice in section 3 refers to the use of a
> crypto exchange to protect the privacy of the subsequent session then
> the key consideration is: "What is the period over which you think
> that such privacy protection ios necessary? If your answer is "20
> years" or even 15 years, then you really need to use PQC right now!
> Not "migrate" but "right now". On the other hand if you don't have
> such a requirement then the advice about the shirt fo PQC algorithms
> need not be so strident.

Correct, there is no rush to immediately switch to PQ signatures that
are used to authenticate the peer, but future compromise is not
relevant, because different authentication keys will protect future
sessions.

> Your own need to use PQC is based on a) your estimate as to when such
> tools wil be available and b) how long you want to maintain the
> integrity of privacy.

More clearly just "maintain privacy".  There's presently a lot more
interest in and deployment of hybrid (or just solo) ML-KEM, than either
hybrid or solo ML-DSA.  There are IANA TLS code points assigned for the
three ML-KEM parameter sets and three hybrids (X25519, P-256 and P-384),
but none yet for ML-DSA.

My Postfix MTA already negotiates X25519MLKEM768 key exchange with
Google's SMTP servers, ML-DSA, on the other hand, is only seen with
another system I deployed, and a personal domain of another PQ early
adopter.

-- 
    Viktor.

_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to