Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Removing some of the eFRODOKEM suites? #4506

Open
randombit opened this issue Dec 30, 2024 · 2 comments
Open

Removing some of the eFRODOKEM suites? #4506

randombit opened this issue Dec 30, 2024 · 2 comments

Comments

@randombit
Copy link
Owner

@reneme

While working on #4403 I see we have quite a few eFRODOKEM suites, I'm not sure it makes sense to include all of them from OQS, since OQS seems like they are just implementing anything/everything. Could we deprecate some and consolidate this down to say

eFRODOKEM_{640,1344}_SHAKE
secp256r1+eFRODOKEM_640_SHAKE
secp521r1+eFRODOKEM_1344_SHAKE

Points here

  1. AES vs SHAKE I don't really care. AES is much faster on systems with AES hardware, I just picked SHAKE since that (sigh) seems to be the fashion these days for PQ.
  2. Picking {640,1344} vs {640,976} don't care, just trying to limit it to 2 vs 3 levels
  3. For hybrid using NIST vs X-curves don't much care
@mouse07410
Copy link
Contributor

Yes, please 1344 rather than 976, yes please NIST curves.

Re. AES vs. Shake - you're correct, Shake is the rage, but all the current hardware has some kind of AES acceleration, vs. nothing for Shake. Don't know the best path forward.

@reneme
Copy link
Collaborator

reneme commented Dec 30, 2024

Re: excessive support of PQ/Hybrid curves: I agree, that zoo is just way too big and should be pruned. I feel, right now it's really just guesswork on what combination will be useful and/or recommended by relevant authorities. E.g. I wouldn't be surprised if BSI were to recommend brainpool+FrodoKEM for certain applications.

In that situation, I feel we should just deprecate all suites that don't stem from an IETF draft and instead invest in an easy-to-extend TLS suite API, so that applications can mix and match if and what they need to.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants