| ▲ | adrian_b 3 hours ago | ||||||||||||||||||||||||||||||||||
I agree with you that one must prepare for the transition to post-quantum signatures, so that when it becomes necessary the transition can be done immediately. However that does not mean that the switch should really be done as soon as it is possible, because it would add unnecessary overhead. This could be done by distributing a set of post-quantum certificates, while continuing to allow the use of the existing certificates. When necessary, the classic certificates could be revoked immediately. | |||||||||||||||||||||||||||||||||||
| ▲ | btilly 2 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
Planning now on a fast upgrade later, is planning on discovering all of the critical bugs after it is too late to do much about them. Things need to be rolled out in advance of need, so that you can get a do-again in case there proves to be a need. | |||||||||||||||||||||||||||||||||||
| ▲ | FiloSottile 3 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
How do you do revocation or software updates securely if your current signature algorithm is compromised? | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||