Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is this final Kyber? #54

Open
adamierymenko opened this issue Jan 18, 2023 · 4 comments
Open

Is this final Kyber? #54

adamierymenko opened this issue Jan 18, 2023 · 4 comments

Comments

@adamierymenko
Copy link

To what extent is Kyber still in flux or is the current standard solid?

https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/C0D3W1KoINY

Of course maybe there's no way to know... just curious if you know or not.

@mberry
Copy link
Member

mberry commented Mar 15, 2023

Only know what is said in the mailing lists or pq conferences. There is talk of replacing the various symmetric crypto algorithms with cSHAKE, from an implementation and simplicity point of view I can certainly get behind that.

Whether NIST removes Kyber512 or 90's mode from I'm still planning to support the current variants in this repo going forward unless there is a security risk doing so. Standardisation is great but happy to accommodate those who want alternatives.

@mberry
Copy link
Member

mberry commented Sep 21, 2023

FIPS 203 - ML KEM

I have a private branch looking at the differences, still waiting on test vectors.

How to proceed with the migration in the rust codebase at this late stage is another question altogether.

@mberry
Copy link
Member

mberry commented Oct 1, 2023

I would honestly be keen on some bikeshedding at this point and how to integrate both current Kyber and ML-KEM in this crate, the differences codewise are quite small but they aren't interoperable.

@bingmatv
Copy link

bingmatv commented Apr 1, 2024

@mberry What specification does version 0.7.1 use? Does v0.7.1 use Round 3 parameters or FIPS-203 parameters? Because NSA (National Security Agency) decreased key length of DES, where IBM version of DES uses 128-bit key, but after NSA modified IBM parameters, DES has only 56-bit keys. It's possible that FIPS-203 reduced Kyber security, so I suggest using NIST Round3 parameters.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants