openpgp-pqc / draft-openpgp-pqc

Repository of the WIP draft-ietf-openpgp-pqc
Other
8 stars 2 forks source link

mandate AES-256 support and promote its use #90

Closed TJ-91 closed 5 months ago

TJ-91 commented 6 months ago

Here is my proposal to include AES-256 as a mandatory-to-implement algorithm and to promote its use as discussed in #74. I tried to consider all cases and find the best balance between forcing (and migrating to) AES-256 and interoperability with the older specs (RFC4880, Crypto Refresh).

Cases to consider are:

Another important aspect: If all involved parties use PQ(/T) keys, then AES-256 will be supported (and hopefully favored) by every party. To further push AES-256, I have added the following sentence to the security considerations:

An implementation SHOULD use AES-256 in the case of a v1 SEIPD packet, or AES-256 and OCB in the case of a v2 SEIPD packet, if all recipients indicate support for it (explicitly or implicitly).

The reason is that when carelessly implementing the specification, an implementation might otherwise choose to take the simple way of always encrypting via AES-128, even if every recipient uses the "Level 5" PQ algorithms.


Please also comment on:


If we want to ask for opinions on the mailing list, the argument is: AES-256 is the obvious choice and this will result in everyone using PQ(/T) + AES-256 in the long run. We are committed to AES-256 anyway by the KEM construction.

TJ-91 commented 6 months ago
wussler commented 6 months ago

Please add a note in the changelog :)

TJ-91 commented 6 months ago

I rebased, added a changelog for the next version, and addressed Falko's comments