Re: [COSE] draft-prorock-cose-post-quantum-signatures [Was: Re: Call for COSE Agenda Items for IETF 113 in Vienna]

Russ Housley <housley@vigilsec.com> Fri, 11 March 2022 20:34 UTC

Return-Path: <housley@vigilsec.com>
X-Original-To: cose@ietfa.amsl.com
Delivered-To: cose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1BAC3A08C7 for <cose@ietfa.amsl.com>; Fri, 11 Mar 2022 12:34:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EZp01DGmFm4P for <cose@ietfa.amsl.com>; Fri, 11 Mar 2022 12:34:09 -0800 (PST)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C64F73A08AE for <cose@ietf.org>; Fri, 11 Mar 2022 12:34:09 -0800 (PST)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id A030815C694; Fri, 11 Mar 2022 15:34:08 -0500 (EST)
Received: from a860b60074bd.fios-router.home (pool-141-156-161-153.washdc.fios.verizon.net [141.156.161.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 94D7D15A1B2; Fri, 11 Mar 2022 15:34:08 -0500 (EST)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
From: Russ Housley <housley@vigilsec.com>
In-Reply-To: <Yit0xOrYJSQXxkMy@LK-Perkele-VII2.locald>
Date: Fri, 11 Mar 2022 15:34:08 -0500
Cc: "cose@ietf.org" <cose@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <F677F35E-8C9B-4FD6-901A-CBEEC36E7E8A@vigilsec.com>
References: <SA2PR00MB1002092057CE9580A4029532F50B9@SA2PR00MB1002.namprd00.prod.outlook.com> <CAGJKSNSVuvmsdy9PmUGW7_a2kGqvAxW0fv+hOqSKE6ZfeagSWw@mail.gmail.com> <Yio968v//v87+fTH@LK-Perkele-VII2.locald> <40bf177b-9ac4-f1ed-db05-a0e8636a9363@gmail.com> <Yit0xOrYJSQXxkMy@LK-Perkele-VII2.locald>
To: Ilari Liusvaara <ilariliusvaara@welho.com>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/cose/g65bW6fWn6dc27XGcSIxCqd_vnA>
Subject: Re: [COSE] draft-prorock-cose-post-quantum-signatures [Was: Re: Call for COSE Agenda Items for IETF 113 in Vienna]
X-BeenThere: cose@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: CBOR Object Signing and Encryption <cose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cose>, <mailto:cose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cose/>
List-Post: <mailto:cose@ietf.org>
List-Help: <mailto:cose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cose>, <mailto:cose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2022 20:34:14 -0000


> On Mar 11, 2022, at 11:11 AM, Ilari Liusvaara <ilariliusvaara@welho.com> wrote:
> 
> On Fri, Mar 11, 2022 at 05:23:48AM +0100, Anders Rundgren wrote:
>> Before deciding to overload "OKP" for a new crypto system, I would discuss the matter with maintainers of cryptographic libraries and APIs.
>> 
>> In the Java platform overloading the native counterparts to OKP keys
>> [1,2] won't happen because that would break a lot.  I guess the same
>> is valid for OpenSSL.
> 
> The way it is supposed to work is to use the raw key parts as key
> material in underlying cryptographic implementation. Implementations
> where that is not possible are just broken.
> 
>> It seems to me that reusing OKP would rather create an artificial
>> "semantic gap" which doesn't exist today where "kty" indeed is
>> synonymous with key type/family (RSA, EC, Ed etc):
>> https://datatracker.ietf.org/doc/html/rfc7517#section-4.1
> 
> There are already two "subtypes" of OKP keys that are not
> interchangeable:
> 
> - Key agreement keys.
> - Signature keys.
> 
> NISTPQC signatures would fit into signature keys "subtype", but NISTPQC
> KEMs will not fit into the key agreement keys "subtype", so that would
> be a third "subtype" (all NISTPQC algorithms have OKP-style key format,
> as this was required by NIST).

Right.  It makes sense to add support for KEM.  We can figure that out without waiting for NIST to announce Round 3 winners.  We can do the work based on RFC 5990.

Russ