[hackathon] PQC X.509 115 Hackathon pre meeting minutes

John Gray <John.Gray@entrust.com> Tue, 01 November 2022 03:34 UTC

Return-Path: <John.Gray@entrust.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7349FC14CF10; Mon, 31 Oct 2022 20:34:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.005
X-Spam-Level:
X-Spam-Status: No, score=-7.005 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=entrust.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eYSAi_AG2TOn; Mon, 31 Oct 2022 20:34:27 -0700 (PDT)
Received: from mx08-0015a003.pphosted.com (mx08-0015a003.pphosted.com [185.183.30.227]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82E13C14F74B; Mon, 31 Oct 2022 20:34:26 -0700 (PDT)
Received: from pps.filterd (m0242863.ppops.net [127.0.0.1]) by mx08-0015a003.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 29VHWgFM024182; Mon, 31 Oct 2022 22:34:03 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=entrust.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=mail1; bh=9RHMr0Nqg/U3EKlAe4QDqp6rw4p2Q/NrQBRpzNWtooY=; b=SYztorjQ1IDuDTBEfb/8y/sbSL3/UEij5S0ibKAzeFoyTKqpIv6LiK2i5MZq+QCgK35u q6R8Yx/ovtVuthSOJtMmvfY1Q8g0vE8k2VnTaEiQqKVrWw36r1Tsiif+K3NYrJel002X DajT08myVp58qgU445XyxT++CZbfXEqpztZmLBPYZLfElNsKwRXBu2zjnlP3u/as1WNC GkYJKuM/rgCPb6Gew4QU9/LWI/3HaEVaiTqLp77R9A2GW1lfX90vYli46D4mnr0zyVKu 2o4iDaC9DMqu9MayZ4Jnr6bzrUyQv41i4rjQVDjVIc7dec3o6EFfMC5yHsSM/vLIKR1z CQ==
Received: from nam04-bn8-obe.outbound.protection.outlook.com (mail-bn8nam04lp2048.outbound.protection.outlook.com [104.47.74.48]) by mx08-0015a003.pphosted.com (PPS) with ESMTPS id 3kh1he9tqr-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 31 Oct 2022 22:34:03 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Y1VjaAH8JlDmMAB4MfsWiN1Q4R68NDTtynoPW1IYxss073sd0PjFe0mmdxJ3aoZ6pkxihFkiBAIZiVYMrRf/Fg3V0GuzGPd5Qaz5mOgLMnwin9u8IGdXrzPUc6DhwCjzdqwg6gy4FXCH3frwYw5WJOJvJkM//YUdb73V9QrWzhwtCjPGWSQSkEGqUSfa7fKihbvlk3sWEhEGvAYu43zlUY3OAt2hCg5a0ezcDOByXoeMHo1DZ9KN7GllzcM8d96ar2oCYns+8R6r+pwMvpNFTSbzcKVOXwTIDGbJOSiB9OxH23bCcVTyxD5KwhY/my9atzQXsC9TMGkAuqjl2ugVTA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9RHMr0Nqg/U3EKlAe4QDqp6rw4p2Q/NrQBRpzNWtooY=; b=oM4M82YaNfkM4xPzdA5ixScIDOxfmh1jfdvGEotzgy48S5Sxf6rqZ/0ywg/NRCY9Kv7KsDGnwZa2rjG1gyST9YLPpnj/lNNr0835uB7lGV2iweCZbupnJbVSF4mvlN5eo7KSfEKkqv0cDjV5fkqRjTDSr50oCb6XjO1SH2jc35BEj9rpSLdHdmRBPI0ffNIOWJ5kjGDD8U25v6HTGYUZhglj6cfdHIGU/AT6UHZThq7QFxi2hn3go0uE5g2M/NsEjFdGOlpHAL1wkjLBufz5VSwTylya2UjPSw0XXPgt1Inug6BbsuAO7qmVLwYvF0QeBr4sFZYbzVHj+vUj7q5CIQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=entrust.com; dmarc=pass action=none header.from=entrust.com; dkim=pass header.d=entrust.com; arc=none
Received: from DM6PR11MB2585.namprd11.prod.outlook.com (2603:10b6:5:ce::22) by DM4PR11MB7279.namprd11.prod.outlook.com (2603:10b6:8:109::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.14; Tue, 1 Nov 2022 03:33:58 +0000
Received: from DM6PR11MB2585.namprd11.prod.outlook.com ([fe80::43eb:1724:f177:db0f]) by DM6PR11MB2585.namprd11.prod.outlook.com ([fe80::43eb:1724:f177:db0f%4]) with mapi id 15.20.5769.019; Tue, 1 Nov 2022 03:33:58 +0000
From: John Gray <John.Gray@entrust.com>
To: 'LAMPS' <spasm@ietf.org>, "hackathon@ietf.org" <hackathon@ietf.org>
CC: "info@baentsch.ch" <info@baentsch.ch>, Felipe Ventura <Felipe.Ventura@entrust.com>, "kris@amongbytes.com" <kris@amongbytes.com>, "Railean, Alexander" <alexander.railean@siemens.com>, "Kretschmer, Andreas" <andreas.kretschmer@siemens.com>, Tim Hollebeek <tim.hollebeek@digicert.com>, Max Pala <M.Pala@cablelabs.com>, Michael Richardson <mcr@sandelman.ca>, Sofía Celi <cherenkov@riseup.net>, "alexandre.petrescu@gmail.com" <alexandre.petrescu@gmail.com>, "Klaußner, Jan" <Jan.Klaussner@d-trust.net>, Florence D <Florence.D@ncsc.gov.uk>, "Vaira, Antonio" <antonio.vaira@siemens.com>, Serge Mister <Serge.Mister@entrust.com>, David Hook <dgh@cryptoworkshop.com>, Carl Wallace <carl@redhoundsoftware.com>, "Markku-Juhani O. Saarinen" <mjos@pqshield.com>, "pat.kelsey@notforadio.com" <pat.kelsey@notforadio.com>
Thread-Topic: PQC X.509 115 Hackathon pre meeting minutes
Thread-Index: AQHY7aLGJtzgem1tgEqE4VLb6whnRA==
Date: Tue, 01 Nov 2022 03:33:58 +0000
Message-ID: <DM6PR11MB25854090EFBCA469B4E7F833EA369@DM6PR11MB2585.namprd11.prod.outlook.com>
References: <CH0PR11MB5739E98B69C5AD88745F539E9F5D9@CH0PR11MB5739.namprd11.prod.outlook.com> <DM6PR11MB25852409BE2751E34E1E83AAEA259@DM6PR11MB2585.namprd11.prod.outlook.com> <DM6PR11MB25852EC7B6A0715311F0A97EEA2D9@DM6PR11MB2585.namprd11.prod.outlook.com> <DM6PR11MB2585D8CB79C287C4E93D9AB4EA309@DM6PR11MB2585.namprd11.prod.outlook.com>
In-Reply-To: <DM6PR11MB2585D8CB79C287C4E93D9AB4EA309@DM6PR11MB2585.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DM6PR11MB2585:EE_|DM4PR11MB7279:EE_
x-ms-office365-filtering-correlation-id: 544a0669-a5de-4b19-4dbf-08dabbb9e935
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB2585.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230022)(136003)(346002)(39860400002)(366004)(396003)(376002)(451199015)(122000001)(66556008)(8936002)(41300700001)(54906003)(66476007)(33656002)(966005)(86362001)(21615005)(8676002)(55016003)(26005)(4326008)(66946007)(110136005)(76116006)(38100700002)(64756008)(71200400001)(66446008)(2906002)(5660300002)(316002)(166002)(52536014)(7416002)(66574015)(83380400001)(478600001)(186003)(9686003)(6506007)(7696005)(53546011)(38070700005)(30864003)(66899015)(5930299009)(15940465004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: P1eJ+cYTGGqb40ih+VrHYCi477ek4dcalK9QUwwUwaMHn1b/RavCnlAYvpC9mQXfqnbLVm2+YLiCVtIuP9dpdIYLLOMroFv0SY8Muf3qr6nl57kIuiq19KCxM8uAvxcDqq+Edtb0/Sa6sX8+aMUAkER8hHOZ0Xgn4Htx+/8dgbccm+cp3vh/6TpAvrEUfjIx3wSChvT9ixFxSVUZXkIUin73Rxn65rTSUshHZLdVfkDPDP/JVoNwcvNBBCKCoaYL5d3IPULfIXXm3aGqgkjfz+z2d5NPxtnMFER2q39D3h+os7S39LAciENaAclNbaIrAZP+eNfbm5ZJmUsIa0b9EUpZmCZ10IkB+pF50f/x5DZsgg3ct8Vp8PPG/6rP5TFi2KADeVV7QvPPjaLiOgJMtI7DtjcB21mFYVI95divM8BiYC5aW17xR0qn0meaBfiJE99nqCfTo3b3lFF2e0F1Ih8XRIoEnfvpSrM6FraHsymwdwX/sW7AxIplMdvWtdiBN0V6oxSxFgHIotndZ+mOG3/a0kkwq5aMVHGan6kI3PMPYXdyhj/j2PkARbARszqDqmFxOXQHUMIVf7SGLsTr1QQ0TbXZcOyQRtv1RJqYea/Blp18e4KVfIJ/35VWog2l0uWMGBOqAblqOom76FjLN9eID1tYPWp70U5vCdkDp5zWt0xAVNj6NA4xQL/BGxyaJVEN3fa7iAA6U2o90V4jjazyKM3Tk2fRcJMnWjFsMRVPJ/PY9IZ+IptGFKAjd9JCQIWxxSRNfkpPGEZI/No3Lot3or1VYqWvVsCwu82CwYr325jRYVtuiTB0+pQMMDQyTVk4XjnBjwmf2EPCzujqV32rZLNzcKykoMIgpPlRrwcqyzz8JrX8gJxydfsUZsv9A84LzV4UJ2XwzRMV8BScDbq6mZjpUaw5g/SO6ovcDrQ5ZNV8iLVDUy40jCxZMEjeEAEYFbAXQzsbm/FaDy42iuTuAl7i2U63Eqa99vkdt9eaiBgK0Xashulo46LwKZtfPXAJx9kgDUnvue8qncHoc6iSPMPV6AgWIDZQbLXGyO97nDWUYtywv0TIIU8L8HkAqDc8I69dxlzQbjsJZPaZx4xI1GPNT4qQz5e88g7WxHJ4l0QL8HjYxGybKBHYwgeYzUARnS9RpWoPN/dgy3z9OBSuCDDQ7oZzvdARahmJ7D1MMPaDxxEPniT7k61Ga7iXQqx2TKNmLQiFeipIIe5njFfjjvbEQoKn+IlvgSAljBne6US8NNpliNDE87nV9IPQeg7DYn2RnDpV4QRWgOa6oFPJVhQP9vLVoBovLZQ7Szyr7cyHEWr1ewMP0VVZ0xxlWGJ+b4aRgw8AdKhFsIRIJoMyqgoQmElgTF73a9UetyxqX0VYm6TuUZWnnBsmN5hv+KapF7c6ovQdFKZpUaZsIs1HEdvCT08SPWk3fMtCbbWdmV7jJQ1Pwx3vmEtHF4GKABS/n0broMsRrrL7mhYV3VoJejpbthtUR8o8Adt3rl8SgxjOtSqJM3wSvGuILhrV0jLgP87lX157jGkq3WMP+7UlK7lgBejZW/lSN+Er3HJhnzbloeY2cMBpLZ1LnwQo
Content-Type: multipart/alternative; boundary="_000_DM6PR11MB25854090EFBCA469B4E7F833EA369DM6PR11MB2585namp_"
MIME-Version: 1.0
X-OriginatorOrg: entrust.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB2585.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 544a0669-a5de-4b19-4dbf-08dabbb9e935
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Nov 2022 03:33:58.1806 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f46cf439-27ef-4acf-a800-15072bb7ddc1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 361PmeOeU4tMaNT7pYkRTgmUsgXp9/XggkHmyKn/4dzZ6aqfWhBnLW9r9LwvaJKHegoPN1icsplaTUub9q1oWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR11MB7279
X-Proofpoint-ORIG-GUID: 7F4zhDNIqquhGK6DAPgvT1TKzyJ-vJuM
X-Proofpoint-GUID: 7F4zhDNIqquhGK6DAPgvT1TKzyJ-vJuM
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-10-31_22,2022-10-31_01,2022-06-22_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 malwarescore=0 mlxlogscore=999 clxscore=1011 priorityscore=1501 phishscore=0 adultscore=0 suspectscore=0 lowpriorityscore=0 bulkscore=0 spamscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2210170000 definitions=main-2211010026
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/HEsa5xZ6sAFeSkqUXk5YkvXpIa8>
X-Mailman-Approved-At: Tue, 01 Nov 2022 05:04:31 -0700
Subject: [hackathon] PQC X.509 115 Hackathon pre meeting minutes
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Nov 2022 03:34:31 -0000

Thanks for attending the pre-meeting today!  I think it was very productive.   For those of you who could not make it, here is a summary:


  1.  We decided to use gather (https://www.ietf.org/how/meetings/gather/) to connect the onsite participants with the remote participants at the following times:

  *   Saturday November 5th at 10am and 4pm GMT (London England Time)
  *   Sunday November 6th at 10am and 1pm GMT (London England Time) – The final presentations are at 2:00 pm on Sunday.

               I also updated the team schedule with the above information:   https://wiki.ietf.org/meeting/115/hackathon/teamschedule


  1.  To foster communication, we decided to use the Hackathon Github to share files, though perhaps there are better IETF tools that would allow us to do this easier.  Pushing and pulling code is always fun, but dropping in files is probably easier if there is such a tool that isn’t too onerous to setup.
  2.  We also talked a bit about the key formats themselves:
     *   For the PQ Public Key, we seemed to agree that having the key encoded as an OCTET_STRING agrees with the current draft standards (dilithium for example).   We understand it uses an extra 4 bytes when it is placed inside the standard SubjectPublicKeyInfo, but for the sake of compatibility it doesn’t seem like a big deal.    It is fairly trivial for encoders and decoders to unwrap these messages.   We can use the same procedure for the other algorithms (Falcon, SPHINCS+ and Kyber).
     *   For the Private Key, we discussed the issue of concatenation of the public key with the private key (as is done in openSSL by default).  Some software implementations need access to the public key.  I also learned from Markku that the Kyber private key already concatenates the full public key.   We seemed to agree that this structure should work in all cases:
PQPrivateKey ::= SEQUENCE {
         version                  Version,
         privateKeyAlgorithm      PrivateKeyAlgorithmIdentifier,
         privateKey               OCTET STRING,
         publicKey                [1] PQPublicKey OPTIONAL
     }

In the case of Kyber, the OPTIONAL publicKey can be omitted as it is already part of the private key.  For the other algorithms it can be included based on application need.   It is also recognized that many applications can just use their own PrivateKey format.  The above is only needed when interchanging private keys (PKCS#12 for example).


     *   For the OIDs, the key seems to be agility.   It seems a number of people are planning to support both sets of OIDS  I sent out earlier (the OQS OIDS and the Entrust OIDS for interoperability).   Carl mentioned he is planning to support all of them, I am working on supporting all of them at once, and I also learned from Michael Baentsch (lead developer for openSSL-oqs) that there is a way to override the OIDS with simple environment variable commands!    He put together this page for us:  at https://github.com/open-quantum-safe/oqs-provider/wiki/Interoperability#ietf-115-hackathon<https://urldefense.com/v3/__https:/github.com/open-quantum-safe/oqs-provider/wiki/Interoperability*ietf-115-hackathon__;Iw!!FJ-Y8qCqXTj2!Y1TcFQZhvY5KvgEPVzmY1p25bL-8eOus0rUxFZtcPdoedImCX9HE0-ZhqEe5exCN8fWgXF2zKZF3AdmZ$>    Ideally we want the ability to drop in whatever OIDs get standardized on short notice, so designing software with that in mind will help collaboration at this time.


  1.  A question on how interactive protocols (CMPv2, SSH, etc) could be tested came up.  Essentially we would need to be able to communicate over an internal network so a server/client can communicate.    Since the event is hosted by Cisco we are assuming there will be some way to accommodate this at the event?   😊
  2.  We also talked about composite, and a few people are interested in testing this format as well, so that is great!
  3.  We briefly touched on signatures, but didn’t get too far into the “hash-then-sign” weeds, as that question comes up.  I imagine it will keep coming up until this issue is fully resolved for the PQ context.   Markku mentioned the XMSS standards do some type of preformatting of the hash, so looking at that may offer some useful guidance.  For our hackathon I think we agree we will stick to full message signing for now.   Obviously there is no reason signing a hash of a message wouldn’t work,  from an algorithms perspective it is just a smaller blob of bits being signed.   😊

I think that about covers everything we talked about today.

See you at the Hackathon on Saturday if you can make it either on gather (online) or in person.

Cheers,

John Gray

From: John Gray
Sent: Tuesday, October 25, 2022 10:16 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org>; 'LAMPS' <spasm@ietf.org>; pqc@ietf.org; hackathon@ietf.org
Cc: info@baentsch.ch; Felipe Ventura <Felipe.Ventura@entrust.com>; kris@amongbytes.com; Railean, Alexander <alexander.railean@siemens.com>; Kretschmer, Andreas <andreas.kretschmer@siemens.com>; Tim Hollebeek <tim.hollebeek@digicert.com>; Max Pala <M.Pala@cablelabs.com>; Michael Richardson <mcr@sandelman.ca>; Sofía Celi <cherenkov@riseup.net>; alexandre.petrescu@gmail.com; Klaußner, Jan <Jan.Klaussner@d-trust.net>; Florence D <Florence.D@ncsc.gov.uk>; Vaira, Antonio <antonio.vaira@siemens.com>; Serge Mister <Serge.Mister@entrust.com>; David Hook <dgh@cryptoworkshop.com>
Subject: PQC X.509 115 Hackathon pre meeting October 31st at 10am EST

I realize I failed to mention a time for our PQC x.509 pre-hackathon meeting.   This is the first hackathon I will be attending, so please forgive my newness of trying to organize this hackathon event…  😊

I am hoping it will be a fun way for us to collaborate with these new PQC key formats.   😊

For the pre-hackathon meeting we will be in gather.town on Monday the 31st in the Hackathon room table G at 10:00am EST (Easter Standard Time).
https://www.ietf.org/how/meetings/gather/

I have made up some slides, but it looks like they were blocked.   My colleague Mike Ounsworth copied the content into this google document

https://docs.google.com/document/d/1A2-D82du0qJjygvBuOlG8Xao3MzDYz1pRDzjT9eY6ls/edit?usp=sharing

Hopefully I covered everything this time.

If you can’t make this pre-meeting that is okay, we look forward to seeing you at the PQC X.509 Hackathon


Cheers,

John Gray
Entrust

From: John Gray
Sent: Friday, October 21, 2022 6:33 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>; 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>; hackathon@ietf.org<mailto:hackathon@ietf.org>
Cc: info@baentsch.ch<mailto:info@baentsch.ch>; Felipe Ventura <Felipe.Ventura@entrust.com<mailto:Felipe.Ventura@entrust.com>>; kris@amongbytes.com<mailto:kris@amongbytes.com>; Railean, Alexander <alexander.railean@siemens.com<mailto:alexander.railean@siemens.com>>; Kretschmer, Andreas <andreas.kretschmer@siemens.com<mailto:andreas.kretschmer@siemens.com>>; Tim Hollebeek <tim.hollebeek@digicert.com<mailto:tim.hollebeek@digicert.com>>; Max Pala <M.Pala@cablelabs.com<mailto:M.Pala@cablelabs.com>>; Michael Richardson <mcr@sandelman.ca<mailto:mcr@sandelman.ca>>; Sofía Celi <cherenkov@riseup.net<mailto:cherenkov@riseup.net>>; alexandre.petrescu@gmail.com<mailto:alexandre.petrescu@gmail.com>; Klaußner, Jan <Jan.Klaussner@d-trust.net<mailto:Jan.Klaussner@d-trust.net>>; Florence D <Florence.D@ncsc.gov.uk<mailto:Florence.D@ncsc.gov.uk>>; Vaira, Antonio <antonio.vaira@siemens.com<mailto:antonio.vaira@siemens.com>>; Serge Mister <Serge.Mister@entrust.com<mailto:Serge.Mister@entrust.com>>; David Hook <dgh@cryptoworkshop.com<mailto:dgh@cryptoworkshop.com>>
Subject: RE: PQC X.509 115 Hackathon

Thanks for your interesting in the PQ Keys and Signatures in X.509 / PKIX Hackathon.   I have tried to cc those people who have expressed interest in the hackathon either via email or by discussion.   Some of you may already know each other, some of you may not.   If I forgot to include you, I apologize.   You are welcome to attend.

We are planning a pre-hackathon meeting Monday October 31st in the IETF’s gather.town in the Hackathon room table G.
https://www.ietf.org/how/meetings/gather/

This will allow everyone to test their A/V and so we can sync up about what we want to hack at.     If you can’t make the meeting, that is okay, let me know and I will send you notes.

Suggested Agenda:

  1.  Introductions
  2.  Discuss Scope (What do people want to test).  I put together this slide deck today which covers much of the scope that I envision.  Hopefully it goes through email without an issue.   Obviously it is not exhaustive, but gives a good starting point for those who may just be starting to take a look at this.

Cheers,

John Gray
Entrust



From: John Gray
Sent: Wednesday, October 12, 2022 8:20 PM
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org<mailto:Mike.Ounsworth=40entrust.com@dmarc.ietf.org>>; 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>; hackathon@ietf.org<mailto:hackathon@ietf.org>
Subject: RE: PQC X.509 115 Hackathon

Thank you for all your comments and suggestions in regards to a PQC X.509 Hackathon.   We have added the details of this hackathon topic to the IETF Hackathon Wiki located here as ‘PQ keys and signatures in X.509 / PKIX’

https://wiki.ietf.org/en/meeting/115/hackathon

We hope that at least one author for each of these drafts is able to join in some capacity so we can attempt to come to a consensus on the key and signature formats of the PQ finalist algorithms.


  *   https://datatracker.ietf.org/doc/html/draft-uni-qsckeys-00.html
  *   https://datatracker.ietf.org/doc/draft-massimo-lamps-pq-sig-certificates/
We plan to distribute a set of OIDS we will use to identify the key and signature formats (we need those to interoperate with the various X.509 structures like PublicKeyInfo, PrivateKeyInfo, X509Certificate, PKCS10, X509CRL, OSCP, CMS, etc).   Ideally we suggest that these are done in an agile way in software to make it easier to plug in the real OID values once they have been officially registered.  We will use formats already suggested in existing drafts whenever possible.

I know there have already been multiple key format proposals for some of the PQ key and Signature drafts, so we can use different OIDs to designate different formats if we want to test with different key and signature formats for the same algorithms.   If there are key and signature formats that aren’t included in the list we provide, please suggest and add to the list.

I plan to add this information into the IETF GitHub repository in the next week, so stay tuned!

If there is something you think we have missed, please let us know.

Cheers,

John Gray
Entrust




From: Spasm <spasm-bounces@ietf.org<mailto:spasm-bounces@ietf.org>> On Behalf Of Mike Ounsworth
Sent: Tuesday, October 4, 2022 9:01 PM
To: 'LAMPS' <spasm@ietf.org<mailto:spasm@ietf.org>>; pqc@ietf.org<mailto:pqc@ietf.org>
Subject: [EXTERNAL] [lamps] PQC X.509 115 Hackathon

WARNING: This email originated outside of Entrust.
DO NOT CLICK links or attachments unless you trust the sender and know the content is safe.
________________________________
Hi LAMPS and people interested in PQC!

As suggested at 114, my colleague John Gray and I would like to do a 115 Hackathon on PQ keys and signatures in X.509 / PKIX.

We are suggesting to play with Dilithium, Falcon, Sphincs+, and Composite signing algorithms in Certs, CRLs, CSRs, PKCS#12s, CMS SignedData, maybe OCSP Responses, maybe Timestamping, maybe CMP. We can bring: the Entrust Toolkit (which we can hack at), Bounce Castle, OpenQuantumSafe-openssl, OpenCA (easier if Max Pala is there, but we can probably figure out how to build it).

The point of the hackathon, I think, is going to be OIDs, and public key / private key formats (ex.: the differences between Dilithium and Falcon encodings in draft-uni-qsckeys, and draft-massimo-lamps-pq-sig-certificates).



Question 1: are others interested in joining us at the hackathon? (no point is signing up for a hackathon spot if we’re the only ones there)

Question 2: whether or not you're joining, what PQ X.509 / PKIX things would you like to see working with Dilithium, Falcon, Sphincs+, Composite?


---
Mike Ounsworth
Software Security Architect, Entrust

Any email and files/attachments transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.