[CFRG] PQ KEM Security Considerations

Nick Sullivan <nicholas.sullivan@gmail.com> Mon, 13 April 2026 14:12 UTC

Return-Path: <nicholas.sullivan@gmail.com>
X-Original-To: cfrg@mail2.ietf.org
Delivered-To: cfrg@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 04775DB44B10 for <cfrg@mail2.ietf.org>; Mon, 13 Apr 2026 07:12:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1776089535; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; h=From:Date:Subject:To; b=dLKT952ydBqlIuIo78v0f6CKDXdCRisZ9biubGnIi9/QfBTNGwOVF8K52cHOS7huw lya+avmchrtVbcT7AtEZvgzEQ+7sqrZzdbN6V8gf/3Qy8eZlbDHgJUmQJXd0hpeXLJ LjxO6YOx0IkvAAKVHesfo3sXviUmxQVVR4OOcFic=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LQ0OHbG0CDsI for <cfrg@mail2.ietf.org>; Mon, 13 Apr 2026 07:12:14 -0700 (PDT)
Received: from mail-yx1-xb129.google.com (mail-yx1-xb129.google.com [IPv6:2607:f8b0:4864:20::b129]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 72198DB4490C for <cfrg@irtf.org>; Mon, 13 Apr 2026 07:10:34 -0700 (PDT)
Received: by mail-yx1-xb129.google.com with SMTP id 956f58d0204a3-650775f427eso4281358d50.2 for <cfrg@irtf.org>; Mon, 13 Apr 2026 07:10:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1776089428; cv=none; d=google.com; s=arc-20240605; b=ITCHGl7OBO3MVhsVoBGtCK8Y5OWlXpt35gK7hJFXxGRG4UgAICyEsodwgo/1NOZuuv RuqPzjTM7mql3L82lAtrs1gyN/rXXJOvwnDEIGv64tJ0KHj/tMYpFdG1sUWlysx+ifuE 4ovuTfQa9+RxTi1uK453pq01Ecra1zJxmhN0fC/BITECc+TTNWNUoXRtK7x05uyrn4Fv ZcXkQ8nRSdumx/NelpnTeRxrjpVQ+aXu/ouAxva/vsAXO1UXVkS0BDT7RucmjhIXdq6W B9K8t+v+e31DMZFYKgviLlYVISudy0ZBaYN4wpnCiWCE27xkkdoZaJ+7f0WpKLLSsz5d YNxA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=to:subject:message-id:date:from:mime-version:dkim-signature; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; fh=I9lEgVqUbbytRRgi/jCy6ZkITtajY28AfrFmE7Zgu5s=; b=eEif42AeD9zc6g4rGWNK7strVgINvvKQ3Jb8NSt4HO/1p83KK4318PlPJaTX2vnDL0 oH3Ld9DwY5CdTkGfris49FuQkdpADnwXoI9LWidNC031C0pZjq4IoR9BTAHbB0MeSYoj ducfzjnFl1yuT0tFkrCT42izW3+3WZpxNxWpDZgP82GS4GApONtIg5hEU3QLp1r0s5kN 5SxrDLgYwtontlbtpFCiokLfzW72PAS6/n59o+1A3O3QZ0nZn2KPOqExeqEIrWduAdP3 cvVymcNBIcFaceOpPCUCPQH8icyOrQA4j6LKqQT4s5OTY7eYysFIb/2ugQGKWLbynV2Z p29w==; darn=irtf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776089428; x=1776694228; darn=irtf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; b=ni369HGGg8mO+9hikpOYtnQrOcVgzliUodXLPuf6ar8cdU9HeyFeFmQgwEg61OgOAO C/E42QVZdvR9hiRI/DKF6dOnsSjZGxFu5b0r6dszuoiNi1cFLI7lAOPPgWAT36E1FxGB dnX6/qow8mFjCE67XzG+d2q6xAuf0TtGfwigeUarDZbgWaQx02Z1lFZH7p/52NHdxuSt 3vvsCPVqvr46y7t2rHysjW69+bId5WnBodQyg3k79l0a4jzTcJU2xqISw8nB715Tbzsw 5bY3bGoHdXHHs9kfKRiVpLxDvbVXxvRmXPKxJcS850fXH8LpZPUihQET813pkw3Y8qrf Y7UA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776089428; x=1776694228; h=to:subject:message-id:date:from:mime-version:x-gm-gg :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=rOXh1NmdyExr4iAL+E/q6Pc03c3jBvtpc9u/z/5TXyA=; b=MfeJS07Gj61qcxnX6lESrDFUcEn7D7Z5RUzn9XCrdLdUuw4xV6aHNeNsA1SxmoCybs 8mDOnU3tguyhitH12KIsXcQ1mjY4k8RC/FrTl8HgA4OT0e9/PUKlc6xHuAcq6bb5O4qL 0y7Ysoz7ntPEEXf09qVnx5svFCzX3pfJEI/cAtzNTfL2L7V7UDegdZt7rlECtB0ZBC5m Bp2HwMzACsDDzz7CMw0aG/rrKaOPbFeHL9Nfd+8xVt2vGgAVZKS0B2FaDqZdl0VTFit5 Bc0lMytPPRujFPpxQI3KC6O5hP+VXK2bdpUqpOgp68z9MErtCmPlsBdJ8YXx1R+uOYXB PxKw==
X-Gm-Message-State: AOJu0YyYGNS3I7USi6GZOekWpLmZLZViOqkbrykA1/OP5MrjUeEW9T4K AqXBU3/8CXR6GFfTfB+huVdn20k9i6IfkFFalZuuWsETJnF3U8OBAKubCpdZ0Y5i5UKg/R+qU8n qtL4y2GPAv4WIRIzGxErM0lHrkvqIoOmpQ7FjwZcO6g==
X-Gm-Gg: AeBDietI9JYN2xF0JhGqfCgL1Rgfi689w7LHyuL3ir5rsXm5RU62tdAcAHEy0d1SRWE ms+nBMqF9s3oP2PH/AmtGtBl/Nu6xMTTJukb9a49WArRiHxUYf4cnBw4sruYP0IVW802PAAz3uF bfhEQvRI24gKmw2ZpKoTuNoxmH3Y4LUIDkTxSO++hAhKqluCAFUIb/Q1gUQnIPBotaY/WTxLUZd Keb4qaemGHO2OH8CjBZnMlUZPysDVBvI1uOl2bKYZ99ZsbusVina5pa5wMOuujOIpFVr9c0Rtxs /bIxuwc85OMHtp0SwCm5wldBy9kYOx66RQqlJ8GvJhXjxFTNd49q5KAWjbP2VUj/FU34xFsa0Ou j8K9+7P9McHRhcSr8r4pG+ZCy5LK3pG4qU4DxRvyYvL+dv585vCQSGjZNpqyG039SZeit4vJiXk E=
X-Received: by 2002:a53:cb49:0:b0:650:327e:b398 with SMTP id 956f58d0204a3-65198a691c0mr10322143d50.10.1776089427480; Mon, 13 Apr 2026 07:10:27 -0700 (PDT)
MIME-Version: 1.0
From: Nick Sullivan <nicholas.sullivan@gmail.com>
Date: Mon, 13 Apr 2026 10:10:16 -0400
X-Gm-Features: AQROBzBSHTxNXgE5irME8XCVqWGl5Jx1y6YnXSSxo-pzQzAXMnq_SaXyLJoZM4o
Message-ID: <CAOjisRwyLy5Z2htFtq4hFUPrQWUzaxwKjWwTdHfPyximHeoaGQ@mail.gmail.com>
To: CFRG <cfrg@irtf.org>
Content-Type: text/plain; charset="UTF-8"
Message-ID-Hash: R4LZXUES7CIPXS74QDZXARGDA5H7ETYE
X-Message-ID-Hash: R4LZXUES7CIPXS74QDZXARGDA5H7ETYE
X-MailFrom: nicholas.sullivan@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; header-match-cfrg.irtf.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [CFRG] PQ KEM Security Considerations
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/eVN6h3NqIVR9y_uqGbrAF4SX_64>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

Hi CFRG,

At IETF 125 I gave a short talk on "KEM Security Considerations" and a
path forward for PQ KEMs.

The problem we are trying to solve is simple: the IETF needs guidance
on which PQ KEMs are reasonable to use in standards-track protocols.
Candidates that come up repeatedly include ML-KEM, NTRU, Classic
McEliece, FrodoKEM, NTRU Prime, and HQC.

There is also clear process history here: at IETF 123 the poll result
was that we should first produce a KEM security requirements document.
We still do not have that requirements document, and today we
effectively only have one per-KEM security considerations writeup (for
ML-KEM).

Current gap and proposed approach (from the IETF 125 slides)
- Current gap: no requirements document exists; one individual draft
covers ML-KEM only.
- Path forward: adopt per-KEM security evaluation /
security-considerations documents.
- Eligibility: KEM has had extensive public cryptanalysis via an open process.
- Target: on the order of weeks, not years.

Links:
- IETF 125 minutes (CFRG session 1):
http://datatracker.ietf.org/doc/minutes-125-cfrg-202603190100/
- Slides: http://datatracker.ietf.org/meeting/125/materials/slides-125-cfrg-pq-kems-02
- ML-KEM security considerations draft:
http://datatracker.ietf.org/doc/draft-sfluhrer-cfrg-ml-kem-security-considerations/

Scope and what the output means

This is not about CFRG "approving" algorithms. The intended output is
a set of documents that protocol working groups can read to understand
security properties and security considerations for protocol use. This
is guidance for protocol designers and implementers, not a ranking
exercise, and not a re-run of the underlying competition or
standardization processes.

Request to the list

Before we talk about adoption of any single KEM-specific document, I
want to ask a simpler question:

Are there plans, or willingness, to write similar
security-considerations documents for other PQ KEMs being discussed
here?

If you are willing to contribute (author or co-author), please reply with:
- which KEM(s) you have in mind
- whether you can produce a draft or outline within a six week
timeframe from today (before May 22)
- whether you think we need a small design team to converge on common
criteria, or whether mailing list discussion is sufficient

Proposed questions (criteria) for per-KEM documents (open for debate)

To make the request concrete, here is my starting point for the kinds
of questions each document should answer. These are intentionally up
for debate. If you think this is too much, too little, or missing key
items, please say so.

I am also separating "is this safe to use" from "how to safely use it":

A) Is this safe to use? (claims, assumptions, evidence)
- Spec and scope: what is the authoritative specification (or specs)
for the KEM, and which parameter sets are in scope for this document.
- Security strength and notion: what security strength is being
targeted (e.g., NIST category / bits of security), what security
notion a protocol would rely on (e.g., IND-CCA-style KEM security for
HPKE-like use), and what the KEM claims under that notion.
- Assumptions and conditions: what attacker model and assumptions the
claim relies on (classical vs PQ, any non-standard assumptions), and
what conditions are required for the claim to hold in practice
(required checks, failure handling, implementation assumptions,
underlying hard problem).
- Basis for confidence: what open, public process and cryptanalysis
record we are relying on. Pointing to an external standard and its
public review is valid here; the goal is not to reinvent proofs in
CFRG.
- Protocol-relevant caveats: known limitations or results that could
affect protocol designs (binding/misbinding properties,
robustness/contributory behavior, misuse sensitivity, and hybrid
composition considerations if applicable), plus a short list of
watchpoints (what would change the assessment).

B) How to safely use it? (protocol designer and implementer guidance)
- Inputs/outputs and encoding: exact sizes and encodings for public
key, ciphertext, and shared secret, plus any required formatting or
canonicalization rules.
- Validation: what input validation is required (public key checks,
ciphertext checks), and what must not be skipped.
- Randomness: what randomness is required for KeyGen and Encaps
(strength and freshness), and what breaks if those requirements are
not met.
- Failures and leakage: correct behavior on decapsulation failure and
invalid ciphertexts, constant-time expectations, and what error
signaling is safe (avoid oracles). State whether fault injection is in
scope or explicitly out of scope.
- Key lifecycle: reuse guidance (static vs ephemeral), PFS
implications, storage and zeroization expectations.
- Interop artifacts: minimum test vectors and negative tests
(malformed inputs), where implementers should pull them from (spec
appendices, reference code, published vector sets), and any evidence
of multi-implementation interop if it exists.
- Decision points in the underlying standard: if the authoritative
spec offers options (variants, modes, knobs), point to the relevant
sections and give protocol designers a clear default and a short
decision guide for when a different option is appropriate. The ML-DSA
security considerations individual draft is a good example of the
level of guidance here
(http://datatracker.ietf.org/doc/draft-connolly-cfrg-ml-dsa-security-considerations/)


About adoption and completeness

If we adopt this topic and/or adopt individual documents, the adoption
call should not be read as "this document is complete." A -00 that
establishes scope, structure, and initial answers is fine, as long as
the authors agree that if the document is adopted they will work it
towards conformance with the (eventual) common criteria and
incorporate review feedback.

Thanks. Please reply if you are willing to write (or co-write) a
document for a specific KEM, and please also reply with suggested
edits to the criteria above.

Nick (for the CFRG chairs)