[openpgp] Re: Size of ML-DSA Secret key in draft-ietf-openpgp-pqc and other considerations
Daniel Huigens <d.huigens@protonmail.com> Tue, 11 February 2025 08:52 UTC
Return-Path: <d.huigens@protonmail.com>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB888C37E177 for <openpgp@ietfa.amsl.com>; Tue, 11 Feb 2025 00:52:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.102
X-Spam-Level:
X-Spam-Status: No, score=-2.102 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=protonmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XdbU4fOQVrc4 for <openpgp@ietfa.amsl.com>; Tue, 11 Feb 2025 00:52:41 -0800 (PST)
Received: from mail-4316.protonmail.ch (mail-4316.protonmail.ch [185.70.43.16]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7DA6C37E15A for <openpgp@ietf.org>; Tue, 11 Feb 2025 00:52:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com; s=protonmail3; t=1739263958; x=1739523158; bh=8iMj47cwpAO2qPP0MmwDkO6X5x11ayF1sd/dQ3F7IYY=; h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References: Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID: Message-ID:BIMI-Selector:List-Unsubscribe:List-Unsubscribe-Post; b=zQ6vm7ow0vRnOdZTRveX464u5Xzbd5cfw0z2VaWLvzyhTHNOm9hnv3dGil1nZfGdR TPcc5nt6CWyG0LSHxVZ9E2K4bJKF1nqQ/wkeDiVPt8xXPAa6F7elnTVXyvYyL9tLkL SigGpt0Rd55I8YlBwaswEC8NVIKkDXgwVvk4swLExEXClwcIHLZlwS4NMj/0cg0Tqb p/oFAIbS7N3WbTswwu+5EM7FNuuKZ3lc8ZT89y31A1V7ahay+/9WE4XvZCVQK0KF8r qQiiPzGmrh2VuxXWsQJP3L6sgdDFHLMi2C9DIZ7oN81PD4gajg32wkrF8/QM3DyrMW UUf9GB6WS9W7Q==
Date: Tue, 11 Feb 2025 08:52:33 +0000
To: Johannes Roth <johannes.roth@mtg.de>
From: Daniel Huigens <d.huigens@protonmail.com>
Message-ID: <T5qQDRoFipqypjxS7EqVzE2G3ATqCJFNm_31Mkd4ixyC6oRHD_hWWnJJp-tEBsNpC2iZe9FnbFl6Gw8TvhX5kisx1uUBnndBfVzo21vPQkk=@protonmail.com>
In-Reply-To: <1c8ebdf0-f99f-4899-876e-1086d782ae74@mtg.de>
References: <f8e34cda2473b36fa3db819fd09fe05ed8fdc35d.camel@redhat.com> <0NnLQ5QK6Pu-Z6OJUjwKuU3n5joUWg5LWhh5PwIzZIKfqD-vMkv5fxt2oZJKeA1MZP0leh6LGwLzjH6CtFf02Pg0KNkknx4LdzGmHhEbTsk=@wussler.it> <2ef0cb6899f56e5d8f50aa0b3aa3238d64fae281.camel@redhat.com> <rmWB0qyA-ZVBoC7QgnHl_tUg4HUBgTFIXytY03V3d9ihX3K7eSYAhYwoSJ-RpxCKhArQy4-OOpcuMJ6KsrKtoLtMB5nQ2NPuMAZlXV0pEko=@wussler.it> <dabadadf-c65a-4f57-bcd5-3057aec9174c@mtg.de> <c32af9d7e4c142b38e3fb9beb6ae5f26@bsi.bund.de> <1c8ebdf0-f99f-4899-876e-1086d782ae74@mtg.de>
Feedback-ID: 2934448:user:proton
X-Pm-Message-ID: da1621362a165544a21392f5b5fd0464f7ac33e2
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: 3O4QUFYQI52MCKCGEBGOFTOQUW4TPYCJ
X-Message-ID-Hash: 3O4QUFYQI52MCKCGEBGOFTOQUW4TPYCJ
X-MailFrom: d.huigens@protonmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-openpgp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "openpgp@ietf.org" <openpgp@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [openpgp] Re: Size of ML-DSA Secret key in draft-ietf-openpgp-pqc and other considerations
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/jNCZMjKsvUl0NdLPQiF5gVP3oVs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Owner: <mailto:openpgp-owner@ietf.org>
List-Post: <mailto:openpgp@ietf.org>
List-Subscribe: <mailto:openpgp-join@ietf.org>
List-Unsubscribe: <mailto:openpgp-leave@ietf.org>
On Tuesday, February 11th, 2025 at 09:11, Johannes Roth wrote: > can't we keep SHA3 as well, meaning we allow both a SHA3 and a SHA2 > variant? The user / policy can then decide what to use. Yeah, I would even say something like; we SHOULD use SHA3 to match the security of the signing algorithm, but MAY use SHA2 if needed for CNSA compliance. Maybe this can be accomplished by keeping the existing text and table and just changing the MUST to a SHOULD, and then either adding some text or an additional column for the fallback option? Best, Daniel
- [openpgp] Size of ML-DSA Secret key in draft-ietf… Simo Sorce
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Aron Wussler
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Simo Sorce
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Aron Wussler
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Falko Strenzke
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Kousidis, Stavros
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Johannes Roth
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Daniel Huigens
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Andrew Gallagher
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Simo Sorce
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Simo Sorce
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Aron Wussler
- [openpgp] Re: Size of ML-DSA Secret key in draft-… Falko Strenzke