Thanks for that message - I don't think I understood the point before.
Frankly speaking, I don't think anyone else beyond your team understands
what's going on either.
So is the solution (1) either-or (2) both-and.  I don't think that is the
same from one group in W3C to another. (I include OID4xxx in that list)
let's just get everyone on PQC.
https://thequantuminsider.com/2025/05/21/microsoft-brings-post-quantum-cryptography-to-windows-and-linux-in-early-access-rollout/

Peace ..tom jones


On Thu, May 22, 2025 at 1:42 PM 'Daniel Huigens' via blink-dev <
blink-dev@chromium.org> wrote:

> Hi Tom,
>
> Bit late to the party, but I wanted to mention that even in the transition
> to PQC, Ed25519 is still relevant, in hybrid/composite constructions; the
> idea being that you sign and verify with both algorithms, so that an
> attacker would need to break both of them.
> For example, see draft-ietf-lamps-pq-composite-sigs
> <https://www.ietf.org/archive/id/draft-ietf-lamps-pq-composite-sigs-04.html>
> and draft-ietf-openpgp-pqc
> <https://www.ietf.org/archive/id/draft-ietf-openpgp-pqc-09.html>, both of
> which define constructions combining ML-DSA and Ed25519/Ed448.
> To quote the former:
> > This document defines combinations of ML-DSA [FIPS.204] in hybrid with
> traditional algorithms (...) Ed25519, and Ed448. These combinations are
> tailored to meet security best practices and regulatory requirements.
> Composite ML-DSA is applicable in any application (...) where the operator
> wants extra protection against breaks or catastrophic bugs in ML-DSA.
>
> Since crypto.subtle is a low-level API, we want to define both components
> of such a construction, so that libraries can implement them however
> they're combined.
> (A draft for the ML-DSA part of that is at
> https://twiss.github.io/webcrypto-modern-algos/pqc.html, but that's less
> far along.)
>
> Best,
> Daniel
>
>
>
> Op zaterdag 12 april 2025 om 20:46:04 UTC+2 schreef Tom Jones:
>
>> to be clear - ED25519 is much faster than the quantum-resistant
>> alternatives, but that does not make it long term secure.
>> To be more specific, we could see an announcement any day that someone
>> has developed a quantum computer that will break it.
>> Or it could be 5 more years - who knows.
>> Google and Microsoft are two of the companies trying to break it.
>>
>> https://hedera.com/blog/are-ed25519-keys-quantum-resistant-exploring-the-future-of-cryptography
>>
>> Peace ..tom jones
>>
>>
>> On Fri, Apr 11, 2025 at 3:34 AM Anna Weine <nkul...@mozilla.com> wrote:
>>
>>> @Tom do you have any link/article/post about the Ed25519 deprecation?
>>> I've not heard about that so I'm very curious.
>>>
>>> Thanks,
>>> A
>>>
>>> On Thursday, April 10, 2025 at 9:12:39 PM UTC+2 Tom Jones wrote:
>>>
>>>> I have been hearing other teams asking to use this "new" crypto in
>>>> other standards, but i cannot for the life of me understand why any effort
>>>> is being put into a crypto scheme that will surely be deprecated (at least
>>>> by the NSA) by the end of this year. I didn't object to adding it here
>>>> until others started to add it to new protocols - which is CLEARLY A BAD
>>>> IDEA.
>>>>
>>>> ..tomj
>>>>
>>>> On Wednesday, April 9, 2025 at 8:17:38 AM UTC-7 Chris Harrelson wrote:
>>>>
>>>>> LGTM3
>>>>>
>>>>> On Thu, Apr 3, 2025 at 1:51 AM Yoav Weiss (@Shopify) <
>>>>> yoav...@chromium.org> wrote:
>>>>>
>>>>>> LGTM2
>>>>>>
>>>>>> On Wed, Apr 2, 2025, 16:18 Daniel Bratell <brat...@gmail.com> wrote:
>>>>>>
>>>>>>> LGTM1
>>>>>>>
>>>>>>> /Daniel
>>>>>>> On 2025-03-31 11:42, Javier Fernandez wrote:
>>>>>>>
>>>>>>> Contact emails jfern...@igalia.com
>>>>>>>
>>>>>>> Explainer
>>>>>>> https://github.com/WICG/webcrypto-secure-curves/blob/main/explainer.md
>>>>>>>
>>>>>>> Specification https://w3c.github.io/webcrypto/#ed25519
>>>>>>>
>>>>>>> Design docs
>>>>>>>
>>>>>>> https://docs.google.com/document/d/1fDTUY3HVAXehi-eSfbi7nxh8ZPw4MpSKM8U1fMdqJlU/edit?usp=sharing
>>>>>>>
>>>>>>> Summary
>>>>>>>
>>>>>>> This feature adds support for Curve25519 algorithms in the Web
>>>>>>> Cryptography API, namely the signature algorithm Ed25519
>>>>>>>
>>>>>>>
>>>>>>> Blink component Blink
>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%22>
>>>>>>>
>>>>>>> TAG review https://github.com/w3ctag/design-reviews/issues/466
>>>>>>>
>>>>>>> TAG review status Issues addressed
>>>>>>>
>>>>>>> Risks
>>>>>>>
>>>>>>>
>>>>>>> Interoperability and Compatibility
>>>>>>>
>>>>>>> WebCrypto API was specified to allow the addition of new
>>>>>>> (normalized) crypto algorithms. When an algorithm is not yet supported 
>>>>>>> by a
>>>>>>> browser, an exception of unrecognized algorithms would be thrown after
>>>>>>> invoking related APIs.
>>>>>>>
>>>>>>>
>>>>>>> *Gecko*: Shipped/Shipping (
>>>>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1804788)
>>>>>>> https://www.mozilla.org/en-US/firefox/130.0/releasenotes/
>>>>>>>
>>>>>>> *WebKit*: Shipped/Shipping (
>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=246145)
>>>>>>> https://developer.apple.com/documentation/safari-technology-preview-release-notes/stp-release-178
>>>>>>>
>>>>>>> *Web developers*: No signals
>>>>>>>
>>>>>>> *Other signals*:
>>>>>>>
>>>>>>> WebView application risks
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> Debuggability
>>>>>>>
>>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? Yes
>>>>>>>
>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>> ? Yes
>>>>>>>
>>>>>>>
>>>>>>> https://wpt.fyi/results/WebCryptoAPI?label=experimental&label=master&aligned
>>>>>>>
>>>>>>>
>>>>>>> Flag name on about://flags WebCryptoEd25519
>>>>>>>
>>>>>>> Finch feature name None
>>>>>>>
>>>>>>> Non-finch justification
>>>>>>>
>>>>>>> The feature has been implemented behind WebCryptoEd25519 runtime
>>>>>>> flag.
>>>>>>>
>>>>>>>
>>>>>>> Requires code in //chrome? False
>>>>>>>
>>>>>>> Tracking bug
>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1370697
>>>>>>>
>>>>>>> Availability expectation The feature is already available on the
>>>>>>> Web Platform, and shipped enabled by default in Firefox and Safari.
>>>>>>>
>>>>>>> Adoption expectation This feature is considered a best practice for
>>>>>>> web apps that need support of Ed25519 signing and X25519 key sharing.
>>>>>>> Relying on external libraries (JS, WASM) is the alternative and implies
>>>>>>> security risks.
>>>>>>>
>>>>>>> Estimated milestones
>>>>>>> Shipping on desktop 137
>>>>>>> Shipping on Android 137
>>>>>>> Shipping on WebView 137
>>>>>>> Shipping on iOS 137
>>>>>>>
>>>>>>> Anticipated spec changes
>>>>>>>
>>>>>>> small-order checks -
>>>>>>> https://github.com/WICG/webcrypto-secure-curves/issues/27
>>>>>>>
>>>>>>> randomized signatures -
>>>>>>> https://github.com/WICG/webcrypto-secure-curves/issues/28
>>>>>>>
>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>> https://chromestatus.com/feature/4913922408710144?gate=5015367861141504
>>>>>>>
>>>>>>> Links to previous Intent discussions Intent to Prototype:
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/faf4f153-1d4c-915d-53d0-0968833cfe55%40igalia.com
>>>>>>>
>>>>>>>
>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>> <https://chromestatus.com/>.
>>>>>>> --
>>>>>>> You received this message because you are subscribed to the Google
>>>>>>> Groups "blink-dev" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>>> To view this discussion visit
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/dc12dc7c-1d3d-4b94-9507-2b7226b85622%40igalia.com
>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/dc12dc7c-1d3d-4b94-9507-2b7226b85622%40igalia.com?utm_medium=email&utm_source=footer>
>>>>>>> .
>>>>>>>
>>>>>>> --
>>>>>>> You received this message because you are subscribed to the Google
>>>>>>> Groups "blink-dev" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>>> To view this discussion visit
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d2e25048-e41b-47dd-b442-c0c403bb4d1c%40gmail.com
>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d2e25048-e41b-47dd-b442-c0c403bb4d1c%40gmail.com?utm_medium=email&utm_source=footer>
>>>>>>> .
>>>>>>>
>>>>>> --
>>>>>> You received this message because you are subscribed to the Google
>>>>>> Groups "blink-dev" group.
>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>>
>>>>> To view this discussion visit
>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSL4%2BSfY2%2BwYKK_MFrK3GXTMeeq0xrOD3pxdsN5P1Oa_Aw%40mail.gmail.com
>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSL4%2BSfY2%2BwYKK_MFrK3GXTMeeq0xrOD3pxdsN5P1Oa_Aw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>> .
>>>>>>
>>>>> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bba3ebd5-5391-4113-a0e2-c3e18c560f60n%40chromium.org
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bba3ebd5-5391-4113-a0e2-c3e18c560f60n%40chromium.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAK2Cwb4UGCiH_8Ze%3DG3Y5eB%3Dxb%2ByzSTCxW82iPsmiMJSkcGd%2Bw%40mail.gmail.com.

Reply via email to