Replies: 5 comments 9 replies
-
How did you come to this conclusion? We (already should) have a full matrix of ports with all OQS KEM and OQS SIG algorithms generated by this code. Server certs on most ports should be OQS sigs, e.g., Dilithium2 starting at port 6086.... Doing a quick check using
These are also sizes in line with a Dilithium2 sig being used, not an RSA one. What am I overlooking? |
Beta Was this translation helpful? Give feedback.
-
@baentsch I mean the signature algorithm, not the public key algorithm. Below is one of the server certificates (public key algorithm dilithium2) installed on the interop server, and you can see the signature algorithm is
|
Beta Was this translation helpful? Give feedback.
-
Merged open-quantum-safe/oqs-demos#242 . Please deploy, @bhess. |
Beta Was this translation helpful? Give feedback.
-
Up and running. Thanks for the PR @pi-314159! |
Beta Was this translation helpful? Give feedback.
-
Currently, the signature of all server certificates installed on the interop test server is sha256WithRSAEncryption. I propose that we add some new ports that support QSC signature. For example, we can generate a Dilithium intermediate CA and use it to sign server certificates. By doing this, we can test the quantum-safe chain.
Beta Was this translation helpful? Give feedback.
All reactions