You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Now that there are official OIDs from NIST, initial support for the three new PQC algorithms can be added.
Initially, signature verification will not be supported as there are no easy-to-install open-source libraries available with the FIPS/final versions of these algorithms yet.
For now, we can at least recognize the OIDs and attempt to deserialize the key (and maybe signature) to detect encoding errors.
The text was updated successfully, but these errors were encountered:
CBonnell
changed the title
Add initial support for ML-DSA, SLH-DSA, and ML-KEM key and signatures
Add initial support for ML-DSA, SLH-DSA, and ML-KEM keys and signatures
Nov 15, 2024
Check for use of pre-hash variants of ML-DSA and SLH-DSA in CA certificates
Detection of historical/obsoleted versions of ML-DSA, SLH-DSA, and ML-KEM
Signature validation has not been added yet, as there are no open-source Python libraries to support this. As such, self-issued (generally root) certificates that do not contain an AKI extension but use ML-DSA or SLH-DSA will encounter a NOTICE-level finding, as it cannot be determined whether the certificate is self-signed. Once such a library is made available, support for signature validation will be added.
Now that there are official OIDs from NIST, initial support for the three new PQC algorithms can be added.
Initially, signature verification will not be supported as there are no easy-to-install open-source libraries available with the FIPS/final versions of these algorithms yet.
For now, we can at least recognize the OIDs and attempt to deserialize the key (and maybe signature) to detect encoding errors.
The text was updated successfully, but these errors were encountered: