On 7/30/25 2:17 AM, ma bing wrote:
NIST has approved HQC (Hamming Quasi-Cyclic) in addition to the already approved ciphers, I suggest to switch from ECC+Kyber to HQC+Kyber; Since ECC is vulnerable to quantum computer, using ECC+Kyber is likely a false positive, so I think HQC+Kyber is better. In conclusion, I think there are 3 concerns.

Eric already addressed the main concern. Hybrid is to give us confidence to deploy these new algorithms.

The other issue is HQC is also significantly larger than ML-KEM*. Part of what makes hybrid doable is that ECC is realtively small, so adding it does not add significant size over ML-KEM's own keys. Performance was such that Amazon found that they could 'just do it' and keep chugging. That removes a significant barrier to deployment.

The second issue is there is a lag time between 'approval' and standards. NIST has decided to move forward with HQC as a NIST standard, but that standard is not yet available. One it is I would expect to see HQC-ECC hybrids out there as well, just so our infrastructure doesn't fall over if ML-KEM becomes classically broken, but as I said, there is no HQC standard, so

Bob

*I'm taking your use of Kyber to mean ML-KEM. Typically we refer to Kyber when we are talking pre-standardized variants of the algorithm. Using HQC would have the same issues as using Kyber (rather than ML-KEM). It was a stop-gap until we had ML-KEM.

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to