On Fri, Feb 21, 2025 at 11:07 PM Geoff Huston <g...@apnic.net> wrote:

> So if the sense of the advice in section 3 refers to the use of a crypto
> exchange to protect the privacy of the subsequent session then the key
> consideration is: "What is the period over which you think that such
> privacy protection ios necessary? If your answer is "20 years" or even 15
> years, then you really need to use PQC right now! Not "migrate" but "right
> now". On the other hand if you don't have such a requirement then the
> advice about the shirt fo PQC algorithms need not be so strident.
>

I'm not sure this is quite the right way to think about it, for several
reasons.

First, there is a fair amount of uncertainty about the actual timeline of
CRQCs. The link you provide provides group estimates of the probabilities
of development of a CRQC over time, so it's not like if my data is only
good for 5 years then I am definitely safe. Rather, there is some
probability that I'm safe and some that I'm not. So, I think you have to
think of this as more of a cost/benefit calculation. Suppose I have two
secrets, one of which will cost me $5 if compromised any time over the next
50 years, and one of which will cost me $5 billion if compromised but only
needs to be kept secret for the next 5 years, I think it's clear which one
more needs to be protected with PQC.

Second, it's very difficult to determine the necessary lifetime for
specific pieces of information, especially from the perspective of a low
layer protocol like TLS, which rarely has much of an idea of what's going
across it. Even at the level of application protocols such as e-mail or
Web, there is a huge variety of secret lifetimes in play.

This isn't to argue for any particular piece of guidance, but just to say
that I think it's hard to bound one's level of risk just by looking at the
time period over which information needs to remain secret.

-Ekr



So the two sentences in section 3 of this draft gloss over a larger set of
> considerations. The first sentence is true, but without some associated
> estimate of WHEN such cryopto-relevant quantum computers will tools will be
> available its a very anodyne observation. Your own need to use PQC is based
> on a) your estimate as to when such tools wil be available and b) how long
> you want to maintain the integrity of privacy.
>
>
>
> NIT: Section 4: "As a counter example, the Usage Profile for DNS over TLS
> [DNSTLS] specifies TLS 1.2 as the default, while also allowing TLS 1.3." I
> fail
> to appreciate the rationale for including this - the text is careful to
> note
> that this applies to new protocols and DNS over TLS is not a new protocol
> at
> this state.
>
>
> We thought it worthwhile to point to a counter-example from previous
> specs, but if it is confusing, I can remove it. I would like to ask the WG
> to weigh in before doing so.
>
>
> As a reviewer I found it confusing enough to note as a NIT. But there is
> just one of me and its just a NIT! Others may have different views of
> course.
>
> cheers,
>
>    Geoff
>
>
>
> _______________________________________________
> Uta mailing list -- uta@ietf.org
> To unsubscribe send an email to uta-le...@ietf.org
>
_______________________________________________
Uta mailing list -- uta@ietf.org
To unsubscribe send an email to uta-le...@ietf.org

Reply via email to