-
Notifications
You must be signed in to change notification settings - Fork 359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support ML-KEM key exchanges #606
Comments
tomaswolf
added a commit
to tomaswolf/mina-sshd
that referenced
this issue
Nov 3, 2024
Refactor the KEM-based KEX paths a little bit; provide the ML-KEMs, and add the DH factories combining the ML-KEMs with the base curves and hashes. KexTest tests that the new key exchanges do work between an Apache MINA sshd client and server. Add an integration test that verifies that the new ML-KEM kex works against an OpenSSH 9.9 server (it only has mlkem768x25519, not the other two variants using ECDH nistp256/384, so we can't test those).
tomaswolf
added a commit
to tomaswolf/mina-sshd
that referenced
this issue
Nov 3, 2024
Refactor the KEM-based KEX paths a little bit; provide the ML-KEMs, and add the DH factories combining the ML-KEMs with the base curves and hashes. KexTest tests that the new key exchanges do work between an Apache MINA sshd client and server. Add an integration test that verifies that the new ML-KEM kex works against an OpenSSH 9.9 server (it only has mlkem768x25519, not the other two variants using ECDH nistp256/384, so we can't test those).
tomaswolf
added a commit
to tomaswolf/mina-sshd
that referenced
this issue
Nov 3, 2024
Refactor the KEM-based KEX paths a little bit; provide the ML-KEMs, and add the DH factories combining the ML-KEMs with the base curves and hashes. KexTest tests that the new key exchanges do work between an Apache MINA sshd client and server. Add an integration test that verifies that the new ML-KEM kex works against an OpenSSH 9.9 server (it only has mlkem768x25519, not the other two variants using ECDH nistp256/384, so we can't test those).
tomaswolf
added a commit
to tomaswolf/mina-sshd
that referenced
this issue
Nov 4, 2024
Refactor the KEM-based KEX paths a little bit; provide the ML-KEMs, and add the DH factories combining the ML-KEMs with the base curves and hashes. KexTest tests that the new key exchanges do work between an Apache MINA sshd client and server. Add an integration test that verifies that the new ML-KEM kex works against an OpenSSH 9.9 server (it only has mlkem768x25519, not the other two variants using ECDH nistp256/384, so we can't test those).
tomaswolf
added a commit
to tomaswolf/mina-sshd
that referenced
this issue
Nov 4, 2024
Refactor the KEM-based KEX paths a little bit; provide the ML-KEMs, and add the DH factories combining the ML-KEMs with the base curves and hashes. KexTest tests that the new key exchanges do work between an Apache MINA sshd client and server. Add an integration test that verifies that the new ML-KEM kex works against an OpenSSH 9.9 server (it only has mlkem768x25519, not the other two variants using ECDH nistp256/384, so we can't test those).
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Support the ML-KEM key exchanges described in a current draft RFC.
Motivation
ML-KEM was standardized by NIST; it is basically Crystals-Kyber with a few modifications. See FIPS 203
OpenSSH is in the process of implementing this.
Alternatives considered
No response
Additional context
This needs
I already have the code for Apache MINA sshd ready; it'll only need some interoperability testing with an OpenSSH that supports ML-KEM.
The text was updated successfully, but these errors were encountered: