Coder Social home page Coder Social logo

pqc_uta's Introduction

Post-Quantum Cryptography Recommendations for Internet Applications

This is the working area for the individual Internet-Draft, "Post-Quantum Cryptography Recommendations for Internet Applications".

Contributing

See the guidelines for contributions.

Contributions can be made by creating pull requests. The GitHub interface supports creating pull requests using the Edit (โœ) button.

Command Line Usage

Formatted text and HTML versions of the draft can be built using make.

$ make

Command line usage requires that you have the necessary software installed. See the instructions.

pqc_uta's People

Contributors

tireddy2 avatar auriee avatar ounsworth avatar thomwiggers avatar danwing avatar

Watchers

 avatar  avatar  avatar Orie Steele avatar  avatar  avatar

pqc_uta's Issues

Only HPKE authenticated mode requires NIKE

The unauthenticated HPKE modes have been defined using KEM primitives, and it's very easy to slot post-quantum KEM into them. The authenticated modes require AKEM or NIKE primitives, for which we don't really have good solutions right now.

Why does email not require confidentiality?

The section on email submission makes a reference to ECH, which I do not understand, but otherwise states that "there are no specific recommendations for SUBMISSION beyond {{ech}}".

HTTPS is fully delved into and has the exact same requirements as email submission: note that email submission also often involves the exchange of authentication tokens or passwords!

TLS alert mechanisms

If the TLS server is not happy with pre-quantum algorithms, then it should simply send the "insufficient_security" alert defined in RFC 8446 and terminate the connection. Otherwise you're still establishing a TLS connection with bad security, which seems like the kind of thing that we got rid of when browsers stopped letting you just click through the "bad certificate" warnings.

Discuss CSR, ACME and CMP.

@OR13 I think it would be worth teasing apart the CA / signing issues with CRQCs from the encryption ones, perhaps a diagram or 2 could help here.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.