Skip to content

Commit

Permalink
Update draft-ietf-lamps-pq-composite-kem.md
Browse files Browse the repository at this point in the history
  • Loading branch information
ounsworth authored Oct 17, 2024
1 parent 4cfcd21 commit dd9b325
Showing 1 changed file with 1 addition and 2 deletions.
3 changes: 1 addition & 2 deletions draft-ietf-lamps-pq-composite-kem.md
Original file line number Diff line number Diff line change
Expand Up @@ -165,7 +165,6 @@ informative:
I-D.draft-ietf-pquip-pqt-hybrid-terminology-04:
I-D.draft-ietf-pquip-hybrid-signature-spectrums-00:
I-D.draft-ietf-lamps-kyber-certificates-01:
I-D.draft-housley-lamps-cms-kemri-02:
X-Wing:
title: "X-Wing The Hybrid KEM You’ve Been Looking For"
date: 2024-01-09
Expand Down Expand Up @@ -247,7 +246,7 @@ informative:

--- abstract

This document introduces a set of Key Encapsulation Mechanism (KEM) schemes that use pairs of cryptographic elements such as public keys and cipher texts to combine their security properties. These schemes effectively mitigate risks associated with the adoption of post-quantum cryptography and are fully compatible with existing X.509, PKIX, and CMS data structures and protocols. This document defines eleven specific pairwise combinations, namely ML-KEM Composite Schemes, that blend ML-KEM with traditional algorithms such as RSA-OAEP, ECDH, X25519, and X448. For use within CMS, this document is intended to be coupled with the CMS KEMRecipientInfo mechanism in {{I-D.housley-lamps-cms-kemri}}. These combinations are tailored to meet security best practices and regulatory requirements. Composite ML-KEM is applicable in any application that would otherwise use ML-KEM, but wants the protection against breaks or catastrophic bugs in ML-KEM.
This document defines combinations of ML-KEM [FIPS.203] in hybrid with traditional algorithms RSA-OAEP, ECDH, X25519, and X448. For use within CMS, this document is intended to be coupled with the CMS KEMRecipientInfo mechanism in {{RFC9629}}. These combinations are tailored to meet security best practices and regulatory requirements. Composite ML-KEM is applicable in any application that uses X.509, PKIX, and CMS data structures and protocols that would otherwise use ML-KEM, but wants the protection against breaks or catastrophic bugs in ML-KEM.

<!-- End of Abstract -->

Expand Down

0 comments on commit dd9b325

Please sign in to comment.