| Thread Links | Date Links | ||||
|---|---|---|---|---|---|
| Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
|
Well as a for-instance, going from OQUAKE to CPaceOQUAKE resulted in an additional message and that was because the ECC PAKE had to get ½ way through before the PQC PAKE could start, nothing to do with the size of the additional public
key. The messages are bigger and they’re bigger than simply the size of the public key, although that is the bulk of the additional message size. So we’re getting more messages and bigger messages with hybrid. And think about TLS. How are certificates going to be provisioned? One for ECDSA and one for ML-DSA? OK, now the bloat is significantly greater than simply the size of the public key. There’s signatures for each certificate and all the
ASN.1 goo that constitutes the certificate—subjectname, issuer, validity period, alternative name, key usage, etc. RFC 9191 was already reporting EAP-TLS failures because of too many (> 50) EAP fragments. Just wait with ML-DSA certificates*! An EE certificate
plus an issuing certificate plus a root of trust? Times 2 (one chain for ECDSA and one chain for ML-DSA)? Whoa! We’ll be well over 100+ fragments and possibly significantly more for a single association! Dan . * my experimentation with an ML-DSA CA and my EST implementation gives me 7800+ byte DER-encoded certificates and there’s nothing very fancy about them (i.e. no special key usage or alternative names).
-- “the object of life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane.” – Marcus Aurelius On 3/26/26, 4:19 PM, "Nehru Bhandaru" <nehru.bhandaru@xxxxxxxxxxxx> wrote:
I don’t have a strong opinion but the standard should not dictate whether hybrid or pure is mandatory. Granted hybrid adds a classical mechanism, but given you bring up the bloat, I think
the classical mechanisms add a small bloat - for example P521 number uses 66 bytes (correct me if wrong), but ML KEM uses public keys and cipher text from 800-1600 bytes…
- N On Thu, Mar 26, 2026 at 2:45 PM Harkins, Dan <daniel.harkins@xxxxxxx> wrote:
To unsubscribe from the STDS-802-11-TGBT list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBT&A=1 |