Implementing X.509 multiple algorithm certificates

Faria Miranda Duarte, J.D. (João) de joao.defariamirandaduarte at tno.nl
Tue Sep 20 14:56:55 UTC 2022


Hi all,

In 2019, the ITU-T standardised the multiple algorithms certificates 
(i.e. hybrid) directly in the X.509 standard 
(https://www.itu.int/rec/T-REC-X.509-201910-I/en). It is based on the 
expired Internet draft by Truskovsky et al 
(https://datatracker.ietf.org/doc/html/draft-truskovsky-lamps-pq-hybrid-x509-01). 


The ITU-T were a bit sneaky. It's in Section 9.8 called "Alternative 
cryptographic algorithms and digital signature extensions" (there is 
also some more relevant info scattered, such as in Section 9.2.2.4 or 
9.3.2.1).

Instead of referring to hybrid certificates, they call them "multiple 
algorithm certificates" and instead of "post-quantum signature", they 
call it "alternative signature". This all corresponds exactly with the 
expired Internet-Draft, which is to address the current 
classical->post-quantum migration.

A timeline published by the ITU-T is found here 
(https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2022/0509/Documents/Jean-Paul%20Lemaire_Public.pdf).

In the second to last slide, they specifically say:

     New extensions have been added to migrate to quantum safe algorithms

I was wondering if this is going to be implemented as it seems to 
deviate quite a bit from the current X.509 code?
This message may contain information that is not intended for you. If you are not the addressee or if this message was sent to you by mistake, you are requested to inform the sender and delete the message. TNO accepts no liability for the content of this e-mail, for the manner in which you use it and for damage of any kind resulting from the risks inherent to the electronic transmission of messages.


More information about the openssl-project mailing list