Skip to content

Commit 12eb989

Browse files
santosomarCopilot
andauthored
Update skills/software-security/rules/codeguard-1-post-quantum-cryptography.md
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
1 parent 7a0972a commit 12eb989

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

skills/software-security/rules/codeguard-1-post-quantum-cryptography.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,6 @@ Concise Code Guard focused on what to implement and how to test it.
5454
- Interoperability: verify hybrid ML‑KEM‑768 and ML‑KEM‑1024 handshakes across representative clients; validate negotiated groups and fallback paths.
5555
- Interoperability ((D)TLS): verify negotiation of X25519MLKEM768 / SecP256r1MLKEM768 hybrids and fallback to classical ECDHE; validate pure ML‑KEM groups only in staged tests.
5656
- Interoperability (IKEv2/IPsec): verify hybrid ML‑KEM‑768 + ECDHE (X25519 or P‑256) via RFC 9242/9370 multi‑KE; confirm fallback to classical ECDHE; evaluate ML‑KEM‑1024 where required. Use vendor‑documented identifiers;
57-
- Re‑key (IKEv2/IPsec): validate re‑key of IKE_SA and CHILD_SA maintains hybrid ML‑KEM + ECDHE; confirm no fallback to classical‑only on re‑key; measure re‑key overhead.
57+
- Re‑key (IKEv2/IPsec): validate re‑key of IKE_SA and CHILD_SAs maintains hybrid ML‑KEM + ECDHE; confirm no fallback to classical‑only on re‑key; measure re‑key overhead.
5858
- Negative: reject legacy/draft Hybrid‑Kyber identifiers and misconfigured groups.
5959
- Performance: measure handshake size and latency (peak and P95) and server CPU after enabling hybrids; tune record sizes and limits as needed.

0 commit comments

Comments
 (0)