Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

X25519Kyber768 Hybrid Post-Quantum Key Exchange for HTTPS #7072

Open
fac-trax opened this issue May 29, 2024 · 2 comments · May be fixed by #7083
Open

X25519Kyber768 Hybrid Post-Quantum Key Exchange for HTTPS #7072

fac-trax opened this issue May 29, 2024 · 2 comments · May be fixed by #7083

Comments

@fac-trax
Copy link

Hybrid key exchange in SSL handshake using ML-KEM in addition to default already has significant usage thanks to Google and Cloudflare. It appears to only be supported currently in TLS 1.3 but is intended for TLS 1.2 as well.

@ghen2
Copy link

ghen2 commented Sep 10, 2024

but is intended for TLS 1.2 as well

The IETF does not intend to backport PQ cryptography to TLS 1.2:
https://www.ietf.org/archive/id/draft-ietf-tls-tls12-frozen-02.html#name-implications-for-post-quant

@jschauma
Copy link

jschauma commented Nov 5, 2024

I think at this point we want to track X25519MLKEM768 (IANA Key Share Entry Group '4588'); X25519Kyber768Draft00 was intended to be experimental and to be replaced by the standardized FIPS 203 X25519MLKEM768. Firefox shipped ML-KEM support in 132.0; Chrome added an experimental flag #use-ml-kem in 130, and based on their announcement will enable that and disable Kyber in 131 (which should go stable on 2024-11-11).

Keeping track of X25519Kyber768Draft00 is probably going to be moot at that point.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants