Re: [Pqc] Mapping the state of PQC and IETF - ssh

Alexandre Petrescu <alexandre.petrescu@gmail.com> Mon, 24 April 2023 10:05 UTC

Return-Path: <alexandre.petrescu@gmail.com>
X-Original-To: pqc@ietfa.amsl.com
Delivered-To: pqc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 291D8C151533 for <pqc@ietfa.amsl.com>; Mon, 24 Apr 2023 03:05:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.63
X-Spam-Level:
X-Spam-Status: No, score=-1.63 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_ADSP_CUSTOM_MED=0.001, FORGED_GMAIL_RCVD=1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, NML_ADSP_CUSTOM_MED=0.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_SOFTFAIL=0.665, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3A9QFavbh3Hp for <pqc@ietfa.amsl.com>; Mon, 24 Apr 2023 03:05:32 -0700 (PDT)
Received: from cirse-smtp-out.extra.cea.fr (cirse-smtp-out.extra.cea.fr [132.167.192.148]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 94312C151524 for <pqc@ietf.org>; Mon, 24 Apr 2023 03:05:32 -0700 (PDT)
Received: from pisaure.intra.cea.fr (pisaure.intra.cea.fr [132.166.88.21]) by cirse-sys.extra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 33OA5UEj044036; Mon, 24 Apr 2023 12:05:30 +0200
Received: from pisaure.intra.cea.fr (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id DB15F204C70; Mon, 24 Apr 2023 12:05:04 +0200 (CEST)
Received: from muguet1-smtp-out.intra.cea.fr (muguet1-smtp-out.intra.cea.fr [132.166.192.12]) by pisaure.intra.cea.fr (Postfix) with ESMTP id CE59C204C6F; Mon, 24 Apr 2023 12:05:04 +0200 (CEST)
Received: from [10.8.32.70] (is156570.intra.cea.fr [10.8.32.70]) by muguet1-sys.intra.cea.fr (8.14.7/8.14.7/CEAnet-Internet-out-4.0) with ESMTP id 33OA4sqK038191; Mon, 24 Apr 2023 12:04:54 +0200
Message-ID: <8167c710-1e1c-ecdc-335c-cb41652aedef@gmail.com>
Date: Mon, 24 Apr 2023 12:04:54 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.10.0
Content-Language: fr
To: Thom Wiggers <thom@thomwiggers.nl>
Cc: pqc@ietf.org
References: <20230303112532.1126239.qmail@cr.yp.to> <b086d1fb-c8a6-80df-320e-cd92e7ec2602@gmail.com> <CABzBS7k2FSWxu--eNVe8-ptPPcJ+qRVosmE2TmsjSXi_v8czBg@mail.gmail.com> <80fec8fc-2a8a-3a1d-d29f-30120b4ea6ca@gmail.com> <CABzBS7kLbyBLzY2ftPSkxkZHn8dcrKekdDEu+2u3DzWnDG=SWw@mail.gmail.com>
From: Alexandre Petrescu <alexandre.petrescu@gmail.com>
In-Reply-To: <CABzBS7kLbyBLzY2ftPSkxkZHn8dcrKekdDEu+2u3DzWnDG=SWw@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/pqc/EGWp4PXFeJrGByokS-JgU3_vGXY>
Subject: Re: [Pqc] Mapping the state of PQC and IETF - ssh
X-BeenThere: pqc@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Post Quantum Cryptography discussion list <pqc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pqc>, <mailto:pqc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pqc/>
List-Post: <mailto:pqc@ietf.org>
List-Help: <mailto:pqc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pqc>, <mailto:pqc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Apr 2023 10:05:35 -0000

I wonder whether openssh's NTRUPrime is made for, or can do, hash
signatures of files?  (in the same manner as MD5 or SHA-256 can do 'file
signatures' as proof of non-tampering).

Or maybe there is another algo and widely available software that could
do some signatures that could be qualified somehow as more 'resistant',
or more 'quantum' than MD5 or SHA-256.

I know that SHA-512 can be considered stronger than SHA-256, but I do
not know whether SHA-256 could be qualified somehow as 'quantum
resistant'?  Or is SHA-512 at a same risk as earlier crypto algorithms
facing brute force attacks from potential quantum computers?

Alex

Le 10/03/2023 à 16:16, Thom Wiggers a écrit :
> Hi Alexandre
> 
> Op vr 10 mrt 2023 om 15:19 schreef Alexandre Petrescu 
> <alexandre.petrescu@gmail.com
> <mailto:alexandre.petrescu@gmail.com>>:
> 
> Let me ask this: when I call 'ssh' in command line without any other 
> argument than the destination host address - is NTRUPrime being
> used? Or do I have to type in some additional option like -qr or
> -ntruprime or similar?
> 
> 
> If you have SSH 8.9 or above AND the remote server supports NTRU
> Prime, that should be used by default, yes, unless you have something
> else configured. If you want to force it, you can do:
> 
> ssh -o KexAlgorithms=sntrup761x25519-sha512@openssh.com 
> <mailto:sntrup761x25519-sha512@openssh.com> <user>@<hostname>
> 
> If the remote server does not support it, SSH will tell you.
> 
> Cheers,
> 
> Thom
> 
> Alex
> 
>> 
>> Cheers,
>> 
>> Thom
>> 
>> Alex
>> 
>> -- Pqc mailing list Pqc@ietf.org <mailto:Pqc@ietf.org>
> <mailto:Pqc@ietf.org <mailto:Pqc@ietf.org>>
>> https://www.ietf.org/mailman/listinfo/pqc
> <https://www.ietf.org/mailman/listinfo/pqc>
>> <https://www.ietf.org/mailman/listinfo/pqc
> <https://www.ietf.org/mailman/listinfo/pqc>>
>> 
>