This is pretty cool! Thanks for sharing this Simon. It is pretty interesting that you're jumping ahead to keys, though with your use case it makes a lot of sense. Do you blog elsewhere about any interesting bits / insights in implementing the SPHNICS+ support? I wrote a blog post of my own on understanding it ( https://er4hn.info/blog/2023.12.16-sphincs_plus-step-by-step/) but it would be neat to hear about how implementation goes in practice. Cheers, Ethan On Sun, Dec 22, 2024 at 5:13 PM Simon Josefsson via openssh-unix-dev < openssh-unix-dev@xxxxxxxxxxx> wrote: > Hi > > I have pushed a (quite preliminary) branch that adds SPHINCS+ SSH > signature support for OpenSSH: > > https://github.com/jas4711/openssh-portable/tree/sphincsp > > I've written a bit about it here: > > > https://blog.josefsson.org/2024/12/23/openssh-and-git-on-a-post-quantum-sphincs/ > > What do you think? > > My primary use-case is for ssh-keygen -Y sign/verify usage to protect > Git commits. It isn't inconceivable that someone would find interactive > SSH use of interest, although I didn't make an effort to test this. > > /Simon > _______________________________________________ > openssh-unix-dev mailing list > openssh-unix-dev@xxxxxxxxxxx > https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev > _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev