[Bug 3472] New: Consider discontinuing support for sntrup761x25519-sha512 at openssh.com
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Thu Sep 8 23:33:57 AEST 2022
https://bugzilla.mindrot.org/show_bug.cgi?id=3472
Bug ID: 3472
Summary: Consider discontinuing support for
sntrup761x25519-sha512 at openssh.com
Product: Portable OpenSSH
Version: v9.0p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Build system
Assignee: unassigned-bugs at mindrot.org
Reporter: ricky.tigg at gmail.com
Hello. Post-quantum cryptographic primitives
sntrup761x25519-sha512 at openssh.com and chacha20-poly1305 at openssh.com
were introduced in OpenSSH respectively in v. 8.5, as default in v.
9.0, and v. 6.5, promoted default cipher in v. 6.9. I mistaken by
conceiving that the project has for policy to solely accept to
integrate algorithm implementations which have been standardised either
by a recognised national or internal standards entity. At this very
time, it seems there is no such standard for NTRU. It's worth noting
that NIST recently decided not to select NTRU for standardisation. It
instead selected CRYSTALS-Kyber in this respect. What could have
happened for it to be integrated in this project, when apparently
nothing intended it for this destiny? Has it ever occurred to any of
you developers that a such integration might be inappropriate? It's
surprising to say the least.
(*)
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8413.pdf#page=47&zoom=100,120,546
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list