Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Caliptra security level in hybrid mode (PQC+ECC) #579

Closed
mojtaba-bisheh opened this issue Aug 29, 2024 · 1 comment
Closed

Caliptra security level in hybrid mode (PQC+ECC) #579

mojtaba-bisheh opened this issue Aug 29, 2024 · 1 comment
Assignees

Comments

@mojtaba-bisheh
Copy link
Contributor

mojtaba-bisheh commented Aug 29, 2024

Although ML-DSA-87 meets the NIST security level category 5 [1], the other components, such as ECC Secp384r1 [2], SHA384 [3], and HMAC384, are classified under category 4. Consequently, the hybrid mode is rated at category 4 for the entire design.

To achieve category 5, the ECC design must be upgraded to ECC Secp521, along with SHA512 and HMAC512. Additionally, fuses and key slots (KV) need to be extended to 521 bits from the current 384 bits.

[1] FIPS 204: Module-Lattice-Based Digital Signature Standard
[2] Recommended Elliptic Curve Domain Parameters
[3] [PQC Security (Evaluation Criteria](https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/evaluation-criteria/security-(evaluation-criteria)

@mojtaba-bisheh
Copy link
Contributor Author

Security level 4 is enough per CNSA 2.0. We can keep PQC at security level 5 (since there is no security level 4 parameter for MLDSA) and use Secp384rl for ECC. so, no need to upgrade to Secp521

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants