Hello,
Thanks for your answer.
I didn't see it that way.
I was focused on the main job of cryptography algorithms, hence encrypting the
data.
When I generate an RSA key with ssh-keygen R1,
I was assuming that once the key exchanged between me and the server (R2),
then all my commands within ssh to the server would be encrypted using R2public,
and the server would answer me with encrypted answers using R1public,
and only us would be able to look at the exchanges.
I forgot most of all the details of digital signature schemes and
authentication, and key agreement are terms I don't use.
I just thought that post-quantum public key cryptography was needed for
communicating between me and the server, and saw that R1 and R2 (with public
and private part) needed to be for a post-quantum public key cryptography
algorithm.
Maybe my focus on R1 and R2 is wrong in the case of SSH because that part is
transparently handled by SSH.
Maybe the choices of the technology once connected with SSH for the rest of the
connection is only in the hands of SSH developpers, and we only care about the
steps that you cited:
key agreement, digital signature schemes and authentication.
I still don't see why only key agreement needs post-quantum hard keys and why
the keys we generate can be easier to break.
I don't have anymore the skills and the will to see why digital signature
schemes and authentication can use "traditional" public key cryptography.
Thanks again for your answer, maybe it will help someone else with a similar
question.
Best regards,
Laurent Lyaudet
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2147463
Title:
ssh-keygen doesn't provide post-quantum algorithms
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2147463/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs