Re: [CFRG] NSA vs. hybrid

Mike Ounsworth <Mike.Ounsworth@entrust.com> Fri, 12 November 2021 14:15 UTC

Return-Path: <Mike.Ounsworth@entrust.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C63113A0A41; Fri, 12 Nov 2021 06:15:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LDAdFN_BUXhU; Fri, 12 Nov 2021 06:15:50 -0800 (PST)
Received: from mx07-0015a003.pphosted.com (mx07-0015a003.pphosted.com [185.132.183.227]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84E533A0A4A; Fri, 12 Nov 2021 06:15:50 -0800 (PST)
Received: from pps.filterd (m0242864.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.16.1.2/8.16.1.2) with ESMTP id 1ACDKpT1024313; Fri, 12 Nov 2021 08:15:48 -0600
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h=from : to : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=mail1; bh=6cuI5B9fPhqDLiX5eozqospjoS/P262qCIEsPP2XwNE=; b=ZMiy2Mos9eVkvEkBCyJMbWylz2+OHs97Dp8WdjPk9bX53oBkOK8gP3GAYpV1Vx21jFHb niyj+G/ijKhFvc2IhbMm1208RKBPjgBSCY8+JKt+MMev3CRB+zgEUeTqQigpLlwLz/XQ RKcA59ADu6RY+hY9kZocbBDhLax1n6ex7oU5ddq2SEIf5oqDB7NHYLGW9EERbp0jMAqF 5dxqNrGqvIv0+WBUtrQxtb825Xfq3k0QR+OK+vjkNVs9lvOdn5G1lS3PVQvTetMShiSe MHkRzoHzzKmC2g3St8puJYoUAvVrn0qSoMHQDGgv5FC2m5SnM2AdmOG7Dt4TnJhq7nM/ Xg==
Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2177.outbound.protection.outlook.com [104.47.59.177]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 3c94qgb7n1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 12 Nov 2021 08:15:47 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KXj5mPHRrvFEuDDTr3dRMcAxZubekY+4MHKbVAiLrpZ7q7j40KKr191O+wN0NxAGlU0r0bYhtoNuhIMrl2EmcZlkV2MLwYdP2pqYQLKxXxd54VIm6nUZEk11CFrLfddz5+iYeY2Q33JU/r/ovW70hYUn93R1S5kXXWtTW8RZGFVh9aLJeiiLr7JFymcql9u5E678BcEp15JGNoPCs4LK6Ny0Qmlr8nM0s+PpMyLPaNZNF11EaAsZsKM8iWSseb9vrKnYkz54qWtZSSZh4jaZesV6qdZQQM+TImA7Tqzf2W3qjG4QmedqPtWmZcL3UdPovyMqQXPoXJ6O2dSPgUrr1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6cuI5B9fPhqDLiX5eozqospjoS/P262qCIEsPP2XwNE=; b=N8Wv357NP7ntVxsqFO0GWrmtefpF2KsGj56EDhB0vlseYp+MTJejIYaaFYSWW7np8YdTXLAEm8FpotAxhdTXdQOv34oS2zwc3xPKclRIeyjpQ6zB95JSCMOaQQPFvsBkArhZZq5vx8/+FL58lbUl6nkwCKni6KySOkPtAYfOr4w2seUQGKSWM5XHgXIn3HgJkgytpxKZl1K9rYRiCW1/aWzOVm9sDuiXifaC4sJQ+1GCRQ8mWprYcVMFSUT9/t6nvyBOrBplQxGx8kBAo95dsRbhd1AV7aAMg78Zn10T7MWDMCYsSk3N7rQR7TDACQw4DqG34MRy07166apj1EAvWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from CH0PR11MB5739.namprd11.prod.outlook.com (2603:10b6:610:100::20) by CH0PR11MB5348.namprd11.prod.outlook.com (2603:10b6:610:bb::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4669.10; Fri, 12 Nov 2021 14:15:43 +0000
Received: from CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::bcf2:571f:eb41:1737]) by CH0PR11MB5739.namprd11.prod.outlook.com ([fe80::bcf2:571f:eb41:1737%2]) with mapi id 15.20.4690.020; Fri, 12 Nov 2021 14:15:42 +0000
From: Mike Ounsworth <Mike.Ounsworth@entrust.com>
To: "cfrg@irtf.org" <cfrg@irtf.org>, LAMPS WG <spasm@ietf.org>
Thread-Topic: [CFRG] NSA vs. hybrid
Thread-Index: AdfXzp/tjs6fcjMYRweIcQ9LV5cM6gAARY8w
Date: Fri, 12 Nov 2021 14:15:42 +0000
Message-ID: <CH0PR11MB5739B5D0A248B9BE796F24E29F959@CH0PR11MB5739.namprd11.prod.outlook.com>
References: <CH0PR11MB5739609AA9ECA48E15FBFCE29F959@CH0PR11MB5739.namprd11.prod.outlook.com>
In-Reply-To: <CH0PR11MB5739609AA9ECA48E15FBFCE29F959@CH0PR11MB5739.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: irtf.org; dkim=none (message not signed) header.d=none;irtf.org; dmarc=none action=none header.from=entrust.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6ec564e3-3758-4b0c-f86a-08d9a5e6e998
x-ms-traffictypediagnostic: CH0PR11MB5348:
x-microsoft-antispam-prvs: <CH0PR11MB5348DE54944C3A315ED0B4799F959@CH0PR11MB5348.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR11MB5739.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(71200400001)(38100700002)(66946007)(33656002)(8936002)(122000001)(30864003)(316002)(38070700005)(2940100002)(66476007)(966005)(53546011)(508600001)(6506007)(2906002)(64756008)(26005)(83380400001)(7696005)(86362001)(186003)(66556008)(9686003)(76116006)(55016002)(52536014)(8676002)(66574015)(110136005)(5660300002)(66446008)(579004)(559001)(309714004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR11MB5739.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ec564e3-3758-4b0c-f86a-08d9a5e6e998
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Nov 2021 14:15:42.8230 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: oRpv9qG4F6x/9CMxkQ+iWPnFPjSZFjzwcz1R39t8BRS4/SZOFObGNwwuTUwlB8oYx8BVocyTofblisAlwYHFmvdsC0Kd3DT+TOMZee9DAfY=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH0PR11MB5348
X-Proofpoint-ORIG-GUID: gqoMWX5yJL6jjyAqODTpxiIBSfrhzjel
X-Proofpoint-GUID: gqoMWX5yJL6jjyAqODTpxiIBSfrhzjel
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.790,Hydra:6.0.425,FMLib:17.0.607.475 definitions=2021-11-12_05,2021-11-12_01,2020-04-07_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 clxscore=1015 lowpriorityscore=0 phishscore=0 impostorscore=0 suspectscore=0 mlxscore=0 malwarescore=0 mlxlogscore=999 adultscore=0 bulkscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2110150000 definitions=main-2111120082
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/ODPtWFjPepOy-NeFelcZjRJyz78>
Subject: Re: [CFRG] NSA vs. hybrid
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Nov 2021 14:15:57 -0000

(resending since I was not subscribed to cfrg)

---
Mike Ounsworth

-----Original Message-----
From: Spasm <spasm-bounces@ietf.org> On Behalf Of Mike Ounsworth
Sent: November 12, 2021 8:08 AM
To: cfrg@irtf.org; LAMPS WG <spasm@ietf.org>
Subject: [EXTERNAL] Re: [lamps] [CFRG] NSA vs. hybrid

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.

______________________________________________________________________
Hi Dan,

Just to clarify / confirm a few points.

> My understanding of the terminology of the slides is that a "composite"
> certificate is one where the protocol is checking _one_ certificate 
> with _one_ signature from the CA as usual, but the signature details 
> are built _internally_ as requiring two component signatures to be valid.

Correct, both the NSA's slides and our Internet-Drafts function that way; the key holder has one PEM private key blob, the certificate has one public key octet string, the certificate has one signatureAlgorithm OID and one signatureValue octet string. If you ASN.1-decode those octet strings you will find that they are actually a sequence their respective object types:

CompositePrivateKey ::= SEQUENCE SIZE (2..MAX) OF OneAsymmetricKey CompositePublicKey ::= SEQUENCE SIZE (2..MAX) OF SubjectPublicKeyInfo CompositeSignatureValue ::= SEQUENCE SIZE (2..MAX) OF BIT STRING

So the design intent is exactly as you describe: the protocol sees a traditionally-structured X.509 certificate containing a public key and a signature as usual, and only inside the crypo lib's `bool verify()` do they need to get unpacked into multiple components.

Relevant I-Ds:
draft-ounsworth-pq-composite-keys-00
draft-ounsworth-pq-composite-sigs-05




> How is a P certificate plus a Q certificate easier to use than a P 
> certificate plus a P+Q certificate?

> Are we supposed to be envisioning a post-quantum signature system that 
> just barely fits into a UDP packet but not if one adds 64 bytes for an 
> Ed25519 signature? If this is supposed to be an objection to the cost 
> of the extra 64 bytes then there also has to be an analysis of how 
> much space is lost by the "non-composite" approach.

Yes! Exactly this!
What about the extra bytes of redundant data between non-composite P and Q certs?

I'll add another: what if the P and Q certs don't match; ie they don't have the same DN, or SANs, or email addresses, EKU, issuing CA, policy OIDs, etc? For example you could imagine an S/MIME system where an X.509 extension on a recipient's encryption cert dictates data retention period of any data encrypted for it. What if the recipient's P and Q certs specify different retention periods? I suppose you need extra logic to detect that and .. do what? Take the smaller of the two if it's security-driven or the larger of the two if it's legal-driven. Not all cert validation systems care about these things, but some do, and the potential for mismatch between the P and Q certs is a brand new dimension to X.509 validation that does not exist in a single-cert world; it's directly increasing the complexity of the X.509 validation computation process. I'm already imagining the CVEs that could crop if you try to use together two certs governed by different policies.




Thank you Dan for elevating this discussion. I think you have perfectly framed the discussion that needs to happen.

---
Mike Ounsworth

-----Original Message-----
From: CFRG <cfrg-bounces@irtf.org> On Behalf Of cfrg-request@irtf.org
Sent: November 12, 2021 6:04 AM
To: cfrg@irtf.org
Subject: [EXTERNAL] CFRG Digest, Vol 199, Issue 7

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.

______________________________________________________________________
Send CFRG mailing list submissions to
        cfrg@irtf.org

To subscribe or unsubscribe via the World Wide Web, visit
        https://urldefense.com/v3/__https://www.irtf.org/mailman/listinfo/cfrg__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR3Qq4OKcQ$
or, via email, send a message with subject or body 'help' to
        cfrg-request@irtf.org

You can reach the person managing the list at
        cfrg-owner@irtf.org

When replying, please edit your Subject line so it is more specific than "Re: Contents of CFRG digest..."


Today's Topics:

   1. NSA vs. hybrid (D. J. Bernstein)
   2. Re: NSA vs. hybrid (Natanael)
   3. Re: NSA vs. hybrid (D. J. Bernstein)


----------------------------------------------------------------------

Message: 1
Date: 12 Nov 2021 09:28:11 -0000
From: "D. J. Bernstein" <djb@cr.yp.to>
To: cfrg@irtf.org
Subject: [CFRG] NSA vs. hybrid
Message-ID: <20211112092811.628364.qmail@cr.yp.to>

This looks to me like something that should be discussed in CFRG rather than LAMPS:

   https://urldefense.com/v3/__https://datatracker.ietf.org/meeting/112/materials/slides-112-lamps-hybrid-non-composite-multi-certificate-00__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR1qAwKISA$
   https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/spasm/McksDhejGgJJ6xG617FEWLbBq0k/__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR2-OkU0HA$

This is one part of a big push by NSA across multiple non-CFRG venues to convince everyone to

   * deploy small lattice systems---which _hopefully_ protects against
     quantum computers---and

   * _turn off ECC_---this is the scary part, since there's a serious
     risk that the small lattice systems are easier to break than ECC.

I would like to see CFRG instead advising integration of ECC into all post-quantum deployments for the foreseeable future. There's no reason that this advice has to wait for NISTPQC standards.

Specific comments follow.

> Rigorous, effective algorithm vetting is a must, NSA has confidence in 
> the NIST PQC process

After evaluations from 2017--2020, the "NIST PQC process" selected various third-round primitives for which NIST was subsequently so surprised by attacks that NIST in 2021 is suddenly promoting an "alternate" primitive and issuing a call for new primitives.

Given that 2017--2020 wasn't enough time for the process to reach safe decisions, why should anyone believe that decisions made by the same process in 2021 or 2022 are safe? It sounds bizarre to me that anyone would be declaring confidence in the process. Where does this confidence come from?

Most of NIST's evaluation process has been hidden from public view.
Anyone who skims

   https://urldefense.com/v3/__https://nvlpubs.nist.gov/nistpubs/ir/2019/NIST.IR.8240.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR1bkG1aCQ$
   https://urldefense.com/v3/__https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR1LVgZRFw$
   https://urldefense.com/v3/__https://nvlpubs.nist.gov/nistpubs/jres/104/5/j45nec.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR366zhD8A$
   https://urldefense.com/v3/__https://nvlpubs.nist.gov/nistpubs/jres/106/3/j63nec.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR19N4uq5w$

can see that NIST's reports on the post-quantum competition are much less detailed than NIST's reports on the AES competition, even though the post-quantum competition is much more complicated.

NIST refuses to call this a "competition", doesn't follow NIST's rules for "competitions", and doesn't follow the transparency rules from NIST's Dual EC post-mortem. FOIA requests have revealed _some_ useful information, but the public can't see most of NIST's work. What the public _can_ see is deeply concerning; see, e.g., Section 5 of https://urldefense.com/v3/__https://cr.yp.to/papers.html*categories__;Iw!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR34GhTXhg$ .

If NSA's "confidence in the NIST PQC process" is based on NSA's special access to that process (apparently stretching back to the outset in 2015, kept secret until July 2020) then NSA should publish the details for everyone else to evaluate. NIST has recently stated in

   https://urldefense.com/v3/__https://web.archive.org/web/20211027161303/https:/*www.nist.gov/blogs/taking-measure/post-quantum-encryption-qa-nists-matt-scholl__;Lw!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR1pd1P1pA$

that "We operate transparently. We???ve shown all our work" so I don't think NSA can point to NIST's privacy as a reason to avoid disclosure.

> NSA only anticipates using hybrid solutions to maintain 
> interoperability during the transition (or where direct drop-in is not
> feasible)

This sounds reckless to me, especially in conjunction with NSA pushing specifically for small lattice-based encryption systems. We've seen breaks of "provably secure" lattice submissions, we've seen continued degradation of security for all lattice submissions, and we've seen one claimed "barrier" after another being broken by new lattice attacks. See

   https://urldefense.com/v3/__https://ntruprime.cr.yp.to/latticerisks-20211031.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR3aBtP_EA$

for how complicated and unstable the security analysis is.

> Any hybrid method adopted should allow for a quick transition to 
> PQ-only solutions

Why is this particular transition important, and what concretely is this goal supposed to mean? How would a choice of "hybrid method" end up delaying such a transition beyond the natural costs of any upgrade?

_If_ everybody sees that big quantum computers have been built _and_ are so cost-effective that ECC obviously no longer has any security value, _then_ there will be a push to declare ECC obsolete and to remove it from protocols, simplifying implementations. I don't see how any particular choice of hybrid approach is an obstacle in this scenario.

> Ensure interoperability with PQ-only systems is included for forward 
> compatibility and to allow for use of direct drop-in of PQ

Is this saying something different from the previous goal, aside from adding the words "forward compatibility" and "direct"?

The slides continue by comparing two approaches to hybrid certificates.
The idea of having certificates work as usual, except for upgrading to a
P+Q signature system that internally requires pre-quantum signature P
and post-quantum signature Q to be valid, is labeled here as "composite certs". The idea of requiring two separate certificates, one using P and one using Q (maybe with some effort to compress redundancy), is what seems to be labeled here as "non-composite certs".

  [ under "PROS" of "composite" certs ]
> Matching security levels of algorithms is built into composite pairs

"Matching security levels" is usually a tool to reduce security rather than to ensure security. See the first three paragraphs of Section 3.2 of https://urldefense.com/v3/__https://cr.yp.to/papers/footloose-20210705.pdf__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR0Vr-2smw$ .

As a concrete example (with encryption rather than signatures), the typical concept of "matching security levels" would object to the new

   sntrup761x25519-sha512@openssh.com

as overkill, since _known attacks_ against sntrup761 are much more expensive than attacks against X25519. However, an analysis that properly accounts for _risks_ is much more complicated and isn't structurally compatible with the "security level" oversimplification.

  [ under "CONS" of "composite" certs ]
> Can require reworking of certificate validation

Yikes---sounds scary given how tricky certificate validation is. But wait a minute. Isn't certificate validation simply calling signature verification as a black box? What has to be reworked here?

  [ under "CONS" of "composite" certs ]
> Maintenance concerns surrounding deprecated algorithms

Why is this supposed to be more of an issue for "composite" certs than for "non-composite" certs?

  [ under "CONS" of "composite" certs ]
> Requires another transition and set of standards from hybrid to PQ

Even _if_ this transition is something we definitely want and something to be worrying about now (see above), how would "non-composite" certs avoid the need for new standards and a transition? For interoperability someone would have to say "Okay, clients have to stop requiring ECC"
followed eventually by "Okay, now servers should stop sending ECC"; sounds to me like transitioning to a new standard!

  [ under "PROS" of "non-composite" certs ]
> Computational processes remain unchanged (but perhaps multiple
> iterations)

This sounds weird, given that the whole point is to be adding new post-quantum primitives into the picture. Perhaps I'm missing some restricted definition of "computational process".

  [ under "PROS" of "non-composite" certs ]
> UDP-based protocols potentially avoid fragmentation issues

I'm puzzled. Are we supposed to be envisioning a post-quantum signature system that just barely fits into a UDP packet but not if one adds 64 bytes for an Ed25519 signature? It would help to have pointers to the specific protocol and specific post-quantum signature system showing that this is a problem, and an explanation of why the correct fix isn't to have the protocol upgraded to be able to use multiple packets so as to support higher-security post-quantum primitives.

  [ under "PROS" of "non-composite" certs ]
> Ease of use for backward compatibility

How is a P certificate plus a Q certificate easier to use than a P certificate plus a P+Q certificate? If this is supposed to be an objection to the cost of the extra 64 bytes then there also has to be an analysis of how much space is lost by the "non-composite" approach.

  [ under "PROS" of "non-composite" certs ]
> Facilitates seamless transition to PQonly, no new standards needed

This sounds like another repetition of the ideas that (1) "PQonly" is the desired goal and (2) specifying "composite" certificates somehow interferes with this. See above.

  [ under "PROS" of "non-composite" certs ]
> Requires support for only two types of structures (traditional and PQ)

Not sure what this is supposed to mean.

> The quantum-resistant algorithms resulting from the NIST program are 
> well-vetted, and NSA has no concerns in this area regarding their 
> security.

Was GeMSS "well-vetted" in mid-2020? Is the same process suddenly risk-free a year later?

> Based on our analysis and experience, NSA has decided that the NSS 
> path forward is toward strictly-PQ solutions, and thus we require 
> flexibility in the architecture of hybrid protocols.

As a procedural note, I don't believe that CFRG, IRTF, and IETF are under any obligation to do what NSA wants, even if NSA labels this as a requirement, even if NSA uses its power to skew the market. The top goal here has to be security.

> As you pointed out, implementation errors in current cryptographic 
> algorithms are quite common, and the statistics you provided on CVEs 
> for 2020 are telling that issue is prevalent even today, with 
> well-established algorithms. As such, if implementation errors are 
> your largest concern, doubling up on algorithms introduces a larger 
> surface for error.

No, it's not that simple. The fact that _both_ primitives are being independently asked to protect the user's data means that one primitive could save the user from errors in the implementation of the other primitive.

Obviously a buffer overflow in one implementation can destroy security, and there are always systems-level concerns regarding extra software, but the risks from the existing X25519/Ed25519 software ecosystem are much smaller than the risks being added by the much more complicated new post-quantum software ecosystem.

> I will emphasize that our non-composite approach does propose changes 
> to existing protocol logic; however, in most instances this is 
> primarily a matter of duplicating existing processes, and not 
> introducing entirely new structure.

So building a signature system that verifies a P signature and a Q signature is "entirely new structure", while building a protocol that verifies a certificate using a P signature and that verifies a certificate using a Q signature isn't "entirely new structure"? I don't get it.

---Dan



------------------------------

Message: 2
Date: Fri, 12 Nov 2021 12:16:43 +0100
From: Natanael <natanael.l@gmail.com>
To: IRTF CFRG <cfrg@irtf.org>
Subject: Re: [CFRG] NSA vs. hybrid
Message-ID:
        <CAAt2M18seCg-Z_QZRma6nOiXS5SpESc=9Wfg_2brUbwiAxpSxQ@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

Den fre 12 nov. 2021 10:29D. J. Bernstein <djb@cr.yp.to> skrev:

> This looks to me like something that should be discussed in CFRG 
> rather than LAMPS:
>
>
> https://urldefense.com/v3/__https://datatracker.ietf.org/meeting/112/m
> aterials/slides-112-lamps-hybrid-non-composite-multi-certificate-00__;
> !!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJ
> h1U3ZFlTEwR1qAwKISA$
>
> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/spas
> m/McksDhejGgJJ6xG617FEWLbBq0k/__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc
> 5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR2-OkU0HA$
>
> This is one part of a big push by NSA across multiple non-CFRG venues 
> to convince everyone to
>
>    * deploy small lattice systems---which _hopefully_ protects against
>      quantum computers---and
>
>    * _turn off ECC_---this is the scary part, since there's a serious
>      risk that the small lattice systems are easier to break than ECC.
>
> I would like to see CFRG instead advising integration of ECC into all 
> post-quantum deployments for the foreseeable future. There's no reason 
> that this advice has to wait for NISTPQC standards.
>
> Specific comments follow.
>
> [...]

  [ under "CONS" of "composite" certs ]
> > Can require reworking of certificate validation
>
> Yikes---sounds scary given how tricky certificate validation is. But 
> wait a minute. Isn't certificate validation simply calling signature 
> verification as a black box? What has to be reworked here?
>

In theory it should be simple, in practice there's constant mistakes made in validating certificate chains and certificate properties. In theory this should be as simple as requiring dual and identical certificate chains with no difference but the asymmetric primitives, requiring both to be valid at once. In practice, I expect this to get messed up in a million different ways.

With that said, I do personally favor adding support for "multi-signature certs", of which composite certs with non PQ and PQ algorithms together is one variant. Fixing this once and making sure it stays fixed feels to me like the better option (in my layman's opinion).

  [ under "CONS" of "composite" certs ]
> > Maintenance concerns surrounding deprecated algorithms
>
> Why is this supposed to be more of an issue for "composite" certs than 
> for "non-composite" certs?
>

My best guess is that with non composite you can easily ignore the cert with non PQ algorithms (just don't supply it to the validator). However a validator with support for composite certs should equally easily be able to ignore non PQ chains.

  [ under "PROS" of "non-composite" certs ]
> > Computational processes remain unchanged (but perhaps multiple
> > iterations)
>
> This sounds weird, given that the whole point is to be adding new 
> post-quantum primitives into the picture. Perhaps I'm missing some 
> restricted definition of "computational process".
>

This is essentially a variant of the argument above, you run the validator twice on different certs with only the primitive being different. The validator needs additional changes to put both chains in the same cert.

  [ under "PROS" of "non-composite" certs ]
> > Ease of use for backward compatibility
>
> How is a P certificate plus a Q certificate easier to use than a P 
> certificate plus a P+Q certificate? If this is supposed to be an 
> objection to the cost of the extra 64 bytes then there also has to be 
> an analysis of how much space is lost by the "non-composite" approach.
>

Similar to above, some older strict validators might reject composite certs with an additional PQ chain even if the non PQ chain is valid. In this case you may need to identify the user agent and serve only a non PQ cert.

However, I don't see what kind of software would have issues with validating the non PQ part in composite certs but which would also happily accept double certificates and validate just the non PQ one and ignore that the other fails to validate (due to incompatibility), so this claim is odd.
Any software updated to support two certs can also update the validator code.

The ability to serve and receive and correctly process double certs will in itself essentially be a new standard.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/cfrg/attachments/20211112/1a7e242b/attachment.htm__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR0hkKeCIQ$ >

------------------------------

Message: 3
Date: 12 Nov 2021 12:03:49 -0000
From: "D. J. Bernstein" <djb@cr.yp.to>
To: cfrg@irtf.org
Subject: Re: [CFRG] NSA vs. hybrid
Message-ID: <20211112120349.636988.qmail@cr.yp.to>

> > ?? [ under "CONS" of "composite" certs ]
> > > Can require reworking of certificate validation
> > Yikes---sounds scary given how tricky certificate validation is. But 
> > wait a minute. Isn't certificate validation simply calling signature 
> > verification as a black box? What has to be reworked here?
> In theory it should be simple, in practice there's constant mistakes 
> made in validating certificate chains and certificate properties. In 
> theory this should be as simple as requiring dual and identical 
> certificate chains with no difference but the asymmetric primitives, requiring both to be valid at once.
> In practice, I expect this to get messed up in a million different ways.

My understanding of the terminology of the slides is that a "composite"
certificate is one where the protocol is checking _one_ certificate with _one_ signature from the CA as usual, but the signature details are built _internally_ as requiring two component signatures to be valid.

This approach doesn't touch the logic of certificate validation outside the signature-verification black box. So I'm puzzled as to why NSA is pointing to "reworking of certificate validation" as a disadvantage for _this_ approach rather than for the _other_ approach.

> > ?? [ under "PROS" of "non-composite" certs ]
> > > Computational processes remain unchanged (but perhaps multiple
> > > iterations)
> > This sounds weird, given that the whole point is to be adding new 
> > post-quantum primitives into the picture. Perhaps I'm missing some 
> > restricted definition of "computational process".
> This is essentially a variant of the argument above, you run the 
> validator twice on different certs with only the primitive being 
> different. The validator needs additional changes to put both chains in the same cert.??

Say P is whichever ECC system and Q is whichever post-quantum system.
Here's my understanding of the two options under discussion:

   (1) Send a certificate with a "composite" P+Q signature to satisfy
       new clients; also, for however long the transition takes, send a
       certificate with a P signature to satisfy old clients.

   (2) To satisfy new clients, send a certificate with a Q signature and
       a certificate with a P signature; the second certificate will
       also satisfy old clients.

I don't see how either of these qualifies as "computational processes remain unchanged": new clients are in any case doing a new Q process.
For the first option, there's a new P+Q signature system; for the second option, there's a new Q signature system and new certificate logic.

---Dan



------------------------------

Subject: Digest Footer

_______________________________________________
CFRG mailing list
CFRG@irtf.org
https://urldefense.com/v3/__https://www.irtf.org/mailman/listinfo/cfrg__;!!FJ-Y8qCqXTj2!KdNX-_sVqfUAG8m1TmVITc5Fxc6clTw2t6tVPbK_yM84bwWmweJs0RJh1U3ZFlTEwR3Qq4OKcQ$


------------------------------

End of CFRG Digest, Vol 199, Issue 7
************************************
Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.

_______________________________________________
Spasm mailing list
Spasm@ietf.org
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/spasm__;!!FJ-Y8qCqXTj2!InWtIGiT2-mU-OAAqiKP1oE75Mb_qA5-yeVsc7n9GoiCbCPo1QtqRAB6qVQcudezPoHjqTTzQw$