Re: Plans for post-quantum-secure signature algorithms for host and public key authentication?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Sat, 12 Jul 2025 06:09:34 +1000 (AEST)
Damien Miller <djm@xxxxxxxxxxx> wrote:

> On Fri, 11 Jul 2025, Aaron Rainbolt wrote:
> 
> > I'm currently writing some documentation for a work project, and
> > part of my job has involved doing a (somewhat over my head) deep
> > dive into the security properties of various cryptography-related
> > algorithms in OpenSSH and which ones are likely to be superior to
> > others in various scenarios. In the process of doing this, I noted
> > that it seems OpenSSH supports post-quantum-secure algorithms for
> > symmetric encryption, key exchange, and message authentication
> > codes, but notably lacks a post-quantum-secure signature algorithm
> > for host key and public key authentication. As I understand it
> > (keep in mind I am not a cryptographer by any means), this means
> > that an attacker with a sufficiently powerful quantum computer
> > could, in the future, MITM SSH connections or spoof trusted client
> > devices.
> > 
> > Are there any plans to integrate a post-quantum-secure signature
> > algorithm in OpenSSH, such as SLH-DSA (SPHINCS+)?  
> 
> We have experimental XMSS support in OpenSSH, but it's not really
> usable and will probably be removed when we get a more modern PQ
> signature scheme.
> 
> There are no concrete plans to add support for a PQ signature scheme
> but I think that it's fairly likely we'll add support for hybrid
> ML-DSA/ed25519 per
> https://datatracker.ietf.org/doc/draft-sun-ssh-composite-sigs/01/

Nice. If some input is allowable, I would like to see SLH-DSA
specifically though since as I understand it, ML-DSA is related to
ML-KEM (Kyber), and there are concerns that Kyber's security properties
may have been intentionally misrepresented by NIST. [1] [2] Currently
in the documentation I'm working on, I've recommended the use of
sntrup761x25519-sha512 over mlkem768x25519-sha256 after skimming
through the mentioned articles. SLH-DSA I believe also has
better-understood security properties, so it may be more reliable.
Obviously having an ML-DSA mode won't hurt, but given the choice, I'd
prefer to use SLH-DSA.

> > (Unrelated, the "About openssh-unix-dev" page [1] claims that the
> > list is open for non-subscribers, but my first attempt at sending
> > this was rejected with "Posting by non-members to
> > openssh-unix-dev@xxxxxxxxxxx is currently disabled, sorry." It
> > might be useful to correct the page so people know to subscribe
> > first.)  
> 
> Sorry, fixed.

Thanks :)

[1] https://blog.cr.yp.to/20231003-countcorrectly.html
[2] https://blog.cr.yp.to/20231125-kyber.html

--
Aaron

Attachment: pgpzbGGjbcwWH.pgp
Description: OpenPGP digital signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux