Hi,

I strongly support adoption of this draft. I find support of SLH-DSA in TLS 1.3 
very useful. With many governments and organizations forbidding use of 
standalone ML-DSA, SLH-DSA is required. With governments requiring migration of 
all existing _deployments_ by 2030-2035, the need for standards is urgent. 
There is absolutely no time to wait, migration of PKI often takes a decade. 
This is very high priority.

Hybrid signatures are not mature with both standards and implementations 
lacking, there are also a lot of different standards for hybrid signatures, 
which makes things worse. With migration of PKI taking significant time, I see 
standalone ML-DSA and standalone SLH-DSA as the only choices.

For many infrastructure use cases of TLS/DTLS/QUIC, the performance of the 
initial handshake is not very important. OpenSSL 3.5 LTS already has support of 
SLH-DSA.

I think Tiru's statement "SLH-DSA is intended to be leveraged in 3GPP 
deployments, particularly for long-lived connections" is correct. The use of 
TLS 1.3 in determined by the TLS profile in TS 33.210. Unless explicitly 
forbidden, support and use of all PQC algorithms is OPTIONAL/MAY. Algorithms 
can be used in 3GPP deployments without having been mentioned in 3GPP 
specifications. And given that ANSSI/BSI/EUCC forbid use of standalone ML-DSA, 
I don't see any other outcome of the 3GPP work than that both standalone ML-DSA 
and standalone SLH-DSA will be used. 3GPP has a long security practice of 
always requiring support of two different algorithms with different 
constructions for everything. I would strongly expect the same thing here.

I am not particularly fond of LSs, but the telecom sector has already sent one 
LS to TLS WG, if SLH-DSA is not processing quickly, I would expect more..., you 
have been warned…
https://datatracker.ietf.org/liaison/2002/

Cheers,
John
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to