[CFRG] PQ KEM Security Considerations
Nick Sullivan <nicholas.sullivan@gmail.com> Mon, 13 April 2026 14:12 UTC
Return-Path: <nicholas.sullivan@gmail.com>
X-Original-To: cfrg@mail2.ietf.org
Delivered-To: cfrg@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 04775DB44B10 for <cfrg@mail2.ietf.org>; Mon, 13 Apr 2026 07:12:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776089535; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; h=From:Date:Subject:To; b=dLKT952ydBqlIuIo78v0f6CKDXdCRisZ9biubGnIi9/QfBTNGwOVF8K52cHOS7huw lya+avmchrtVbcT7AtEZvgzEQ+7sqrZzdbN6V8gf/3Qy8eZlbDHgJUmQJXd0hpeXLJ LjxO6YOx0IkvAAKVHesfo3sXviUmxQVVR4OOcFic=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LQ0OHbG0CDsI for <cfrg@mail2.ietf.org>; Mon, 13 Apr 2026 07:12:14 -0700 (PDT)
Received: from mail-yx1-xb129.google.com (mail-yx1-xb129.google.com [IPv6:2607:f8b0:4864:20::b129]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 72198DB4490C for <cfrg@irtf.org>; Mon, 13 Apr 2026 07:10:34 -0700 (PDT)
Received: by mail-yx1-xb129.google.com with SMTP id 956f58d0204a3-650775f427eso4281358d50.2 for <cfrg@irtf.org>; Mon, 13 Apr 2026 07:10:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1776089428; cv=none; d=google.com; s=arc-20240605; b=ITCHGl7OBO3MVhsVoBGtCK8Y5OWlXpt35gK7hJFXxGRG4UgAICyEsodwgo/1NOZuuv RuqPzjTM7mql3L82lAtrs1gyN/rXXJOvwnDEIGv64tJ0KHj/tMYpFdG1sUWlysx+ifuE 4ovuTfQa9+RxTi1uK453pq01Ecra1zJxmhN0fC/BITECc+TTNWNUoXRtK7x05uyrn4Fv ZcXkQ8nRSdumx/NelpnTeRxrjpVQ+aXu/ouAxva/vsAXO1UXVkS0BDT7RucmjhIXdq6W B9K8t+v+e31DMZFYKgviLlYVISudy0ZBaYN4wpnCiWCE27xkkdoZaJ+7f0WpKLLSsz5d YNxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=to:subject:message-id:date:from:mime-version:dkim-signature; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; fh=I9lEgVqUbbytRRgi/jCy6ZkITtajY28AfrFmE7Zgu5s=; b=eEif42AeD9zc6g4rGWNK7strVgINvvKQ3Jb8NSt4HO/1p83KK4318PlPJaTX2vnDL0 oH3Ld9DwY5CdTkGfris49FuQkdpADnwXoI9LWidNC031C0pZjq4IoR9BTAHbB0MeSYoj ducfzjnFl1yuT0tFkrCT42izW3+3WZpxNxWpDZgP82GS4GApONtIg5hEU3QLp1r0s5kN 5SxrDLgYwtontlbtpFCiokLfzW72PAS6/n59o+1A3O3QZ0nZn2KPOqExeqEIrWduAdP3 cvVymcNBIcFaceOpPCUCPQH8icyOrQA4j6LKqQT4s5OTY7eYysFIb/2ugQGKWLbynV2Z p29w==; darn=irtf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776089428; x=1776694228; darn=irtf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; b=ni369HGGg8mO+9hikpOYtnQrOcVgzliUodXLPuf6ar8cdU9HeyFeFmQgwEg61OgOAO C/E42QVZdvR9hiRI/DKF6dOnsSjZGxFu5b0r6dszuoiNi1cFLI7lAOPPgWAT36E1FxGB dnX6/qow8mFjCE67XzG+d2q6xAuf0TtGfwigeUarDZbgWaQx02Z1lFZH7p/52NHdxuSt 3vvsCPVqvr46y7t2rHysjW69+bId5WnBodQyg3k79l0a4jzTcJU2xqISw8nB715Tbzsw 5bY3bGoHdXHHs9kfKRiVpLxDvbVXxvRmXPKxJcS850fXH8LpZPUihQET813pkw3Y8qrf Y7UA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776089428; x=1776694228; h=to:subject:message-id:date:from:mime-version:x-gm-gg :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; b=MfeJS07Gj61qcxnX6lESrDFUcEn7D7Z5RUzn9XCrdLdUuw4xV6aHNeNsA1SxmoCybs 8mDOnU3tguyhitH12KIsXcQ1mjY4k8RC/FrTl8HgA4OT0e9/PUKlc6xHuAcq6bb5O4qL 0y7Ysoz7ntPEEXf09qVnx5svFCzX3pfJEI/cAtzNTfL2L7V7UDegdZt7rlECtB0ZBC5m Bp2HwMzACsDDzz7CMw0aG/rrKaOPbFeHL9Nfd+8xVt2vGgAVZKS0B2FaDqZdl0VTFit5 Bc0lMytPPRujFPpxQI3KC6O5hP+VXK2bdpUqpOgp68z9MErtCmPlsBdJ8YXx1R+uOYXB PxKw==
X-Gm-Message-State: AOJu0YyYGNS3I7USi6GZOekWpLmZLZViOqkbrykA1/OP5MrjUeEW9T4K AqXBU3/8CXR6GFfTfB+huVdn20k9i6IfkFFalZuuWsETJnF3U8OBAKubCpdZ0Y5i5UKg/R+qU8n qtL4y2GPAv4WIRIzGxErM0lHrkvqIoOmpQ7FjwZcO6g==
X-Gm-Gg: AeBDietI9JYN2xF0JhGqfCgL1Rgfi689w7LHyuL3ir5rsXm5RU62tdAcAHEy0d1SRWE ms+nBMqF9s3oP2PH/AmtGtBl/Nu6xMTTJukb9a49WArRiHxUYf4cnBw4sruYP0IVW802PAAz3uF bfhEQvRI24gKmw2ZpKoTuNoxmH3Y4LUIDkTxSO++hAhKqluCAFUIb/Q1gUQnIPBotaY/WTxLUZd Keb4qaemGHO2OH8CjBZnMlUZPysDVBvI1uOl2bKYZ99ZsbusVina5pa5wMOuujOIpFVr9c0Rtxs /bIxuwc85OMHtp0SwCm5wldBy9kYOx66RQqlJ8GvJhXjxFTNd49q5KAWjbP2VUj/FU34xFsa0Ou j8K9+7P9McHRhcSr8r4pG+ZCy5LK3pG4qU4DxRvyYvL+dv585vCQSGjZNpqyG039SZeit4vJiXk E=
X-Received: by 2002:a53:cb49:0:b0:650:327e:b398 with SMTP id 956f58d0204a3-65198a691c0mr10322143d50.10.1776089427480; Mon, 13 Apr 2026 07:10:27 -0700 (PDT)
MIME-Version: 1.0
From: Nick Sullivan <nicholas.sullivan@gmail.com>
Date: Mon, 13 Apr 2026 10:10:16 -0400
X-Gm-Features: AQROBzBSHTxNXgE5irME8XCVqWGl5Jx1y6YnXSSxo-pzQzAXMnq_SaXyLJoZM4o
Message-ID: <CAOjisRwyLy5Z2htFtq4hFUPrQWUzaxwKjWwTdHfPyximHeoaGQ@mail.gmail.com>
To: CFRG <cfrg@irtf.org>
Content-Type: text/plain; charset="UTF-8"
Message-ID-Hash: R4LZXUES7CIPXS74QDZXARGDA5H7ETYE
X-Message-ID-Hash: R4LZXUES7CIPXS74QDZXARGDA5H7ETYE
X-MailFrom: nicholas.sullivan@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; header-match-cfrg.irtf.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [CFRG] PQ KEM Security Considerations
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/eVN6h3NqIVR9y_uqGbrAF4SX_64>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>
Hi CFRG, At IETF 125 I gave a short talk on "KEM Security Considerations" and a path forward for PQ KEMs. The problem we are trying to solve is simple: the IETF needs guidance on which PQ KEMs are reasonable to use in standards-track protocols. Candidates that come up repeatedly include ML-KEM, NTRU, Classic McEliece, FrodoKEM, NTRU Prime, and HQC. There is also clear process history here: at IETF 123 the poll result was that we should first produce a KEM security requirements document. We still do not have that requirements document, and today we effectively only have one per-KEM security considerations writeup (for ML-KEM). Current gap and proposed approach (from the IETF 125 slides) - Current gap: no requirements document exists; one individual draft covers ML-KEM only. - Path forward: adopt per-KEM security evaluation / security-considerations documents. - Eligibility: KEM has had extensive public cryptanalysis via an open process. - Target: on the order of weeks, not years. Links: - IETF 125 minutes (CFRG session 1): http://datatracker.ietf.org/doc/minutes-125-cfrg-202603190100/ - Slides: http://datatracker.ietf.org/meeting/125/materials/slides-125-cfrg-pq-kems-02 - ML-KEM security considerations draft: http://datatracker.ietf.org/doc/draft-sfluhrer-cfrg-ml-kem-security-considerations/ Scope and what the output means This is not about CFRG "approving" algorithms. The intended output is a set of documents that protocol working groups can read to understand security properties and security considerations for protocol use. This is guidance for protocol designers and implementers, not a ranking exercise, and not a re-run of the underlying competition or standardization processes. Request to the list Before we talk about adoption of any single KEM-specific document, I want to ask a simpler question: Are there plans, or willingness, to write similar security-considerations documents for other PQ KEMs being discussed here? If you are willing to contribute (author or co-author), please reply with: - which KEM(s) you have in mind - whether you can produce a draft or outline within a six week timeframe from today (before May 22) - whether you think we need a small design team to converge on common criteria, or whether mailing list discussion is sufficient Proposed questions (criteria) for per-KEM documents (open for debate) To make the request concrete, here is my starting point for the kinds of questions each document should answer. These are intentionally up for debate. If you think this is too much, too little, or missing key items, please say so. I am also separating "is this safe to use" from "how to safely use it": A) Is this safe to use? (claims, assumptions, evidence) - Spec and scope: what is the authoritative specification (or specs) for the KEM, and which parameter sets are in scope for this document. - Security strength and notion: what security strength is being targeted (e.g., NIST category / bits of security), what security notion a protocol would rely on (e.g., IND-CCA-style KEM security for HPKE-like use), and what the KEM claims under that notion. - Assumptions and conditions: what attacker model and assumptions the claim relies on (classical vs PQ, any non-standard assumptions), and what conditions are required for the claim to hold in practice (required checks, failure handling, implementation assumptions, underlying hard problem). - Basis for confidence: what open, public process and cryptanalysis record we are relying on. Pointing to an external standard and its public review is valid here; the goal is not to reinvent proofs in CFRG. - Protocol-relevant caveats: known limitations or results that could affect protocol designs (binding/misbinding properties, robustness/contributory behavior, misuse sensitivity, and hybrid composition considerations if applicable), plus a short list of watchpoints (what would change the assessment). B) How to safely use it? (protocol designer and implementer guidance) - Inputs/outputs and encoding: exact sizes and encodings for public key, ciphertext, and shared secret, plus any required formatting or canonicalization rules. - Validation: what input validation is required (public key checks, ciphertext checks), and what must not be skipped. - Randomness: what randomness is required for KeyGen and Encaps (strength and freshness), and what breaks if those requirements are not met. - Failures and leakage: correct behavior on decapsulation failure and invalid ciphertexts, constant-time expectations, and what error signaling is safe (avoid oracles). State whether fault injection is in scope or explicitly out of scope. - Key lifecycle: reuse guidance (static vs ephemeral), PFS implications, storage and zeroization expectations. - Interop artifacts: minimum test vectors and negative tests (malformed inputs), where implementers should pull them from (spec appendices, reference code, published vector sets), and any evidence of multi-implementation interop if it exists. - Decision points in the underlying standard: if the authoritative spec offers options (variants, modes, knobs), point to the relevant sections and give protocol designers a clear default and a short decision guide for when a different option is appropriate. The ML-DSA security considerations individual draft is a good example of the level of guidance here (http://datatracker.ietf.org/doc/draft-connolly-cfrg-ml-dsa-security-considerations/) About adoption and completeness If we adopt this topic and/or adopt individual documents, the adoption call should not be read as "this document is complete." A -00 that establishes scope, structure, and initial answers is fine, as long as the authors agree that if the document is adopted they will work it towards conformance with the (eventual) common criteria and incorporate review feedback. Thanks. Please reply if you are willing to write (or co-write) a document for a specific KEM, and please also reply with suggested edits to the criteria above. Nick (for the CFRG chairs)
- [CFRG] PQ KEM Security Considerations Nick Sullivan
- [CFRG] Re: PQ KEM Security Considerations Loganaden Velvindron
- [CFRG] Re: PQ KEM Security Considerations Simon Josefsson
- [CFRG] Re: [EXT] Re: PQ KEM Security Consideratio… Blumenthal, Uri - 0553 - MITLL
- [CFRG] Re: [EXT] Re: PQ KEM Security Consideratio… Loganaden Velvindron
- [CFRG] Re: [EXT] Re: PQ KEM Security Consideratio… D. J. Bernstein