-
Notifications
You must be signed in to change notification settings - Fork 280
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support finalized NIST PQC signature algorithms #521
Comments
It might still be a little bit too early. Not everything around ML-DSA and SLH-DSA is in a final state yet, for example the specs for the OIDs are still in a draft status: But apart from that I agree that KSE should support PQC algorithms in the near future. Do you want to work on this? |
Sorry, I was not aware of the OIDs still being in draft status. In that case it makes sense to wait. |
It turns out that we need to experiment with PQC certificates. It would be great if you could release support for at least ML-DSA-87 and ML-KEM-1024, even with draft OIDs. Looks like BouncyCastle already includes support for them. |
To add to this context on the new algorithms, I just received this article. Let's hope to see soon if the deadlines can be met. |
Now that NIST has finalized the first PQC algorithms and BouncyCastle supports them (1.79+), it would be beneficial to have some measure of support in KSE.
Certificates signed with ML-DSA and SLH-DSA should be supported, both as primary signature and alternate signature (via extensions subjectAltPublicKeyInfo (2.5.29.72), altSignatureAlgorithm (2.5.29.73) and altSignatureValue (2.5.29.74)).
The text was updated successfully, but these errors were encountered: