Design issues for hybrid key exchange in TLS 1.3
draft-stebila-tls-hybrid-design-01

The information below is for an old version of the document
Document Type Expired Internet-Draft (individual)
Authors Douglas Steblia  , Scott Fluhrer  , Shay Gueron 
Last updated 2020-01-09 (latest revision 2019-07-08)
Replaced by draft-ietf-tls-hybrid-design
Stream (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-stebila-tls-hybrid-design-01.txt

Abstract

Hybrid key exchange refers to using multiple key exchange algorithms simultaneously and combining the result with the goal of providing security even if all but one of the component algorithms is broken, and is motivated by transition to post-quantum cryptography. This document categorizes various design considerations for using hybrid key exchange in the Transport Layer Security (TLS) protocol version 1.3 and outlines two concrete instantiations for consideration.

Authors

Douglas Steblia (dstebila@uwaterloo.ca)
Scott Fluhrer (sfluhrer@cisco.com)
Shay Gueron (shay.gueron@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)