Re: [saag] sntrup761x25519-sha512

"Kampanakis, Panos" <kpanos@amazon.com> Tue, 23 May 2023 14:31 UTC

Return-Path: <prvs=500838118=kpanos@amazon.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 53CCFC1516E2 for <saag@ietfa.amsl.com>; Tue, 23 May 2023 07:31:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.597
X-Spam-Level:
X-Spam-Status: No, score=-14.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazon.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SMsqmYHSR2Pb for <saag@ietfa.amsl.com>; Tue, 23 May 2023 07:31:11 -0700 (PDT)
Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com [99.78.197.218]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76041C151073 for <saag@ietf.org>; Tue, 23 May 2023 07:31:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1684852272; x=1716388272; h=from:to:cc:date:message-id:references:in-reply-to: mime-version:subject; bh=+ocjzDBe8NedhuOCg7xTl5uAD9Jv72mrxQtgHHvPaxE=; b=qFgfD9/8sg0MHUHiNVoKVnQClxNpZfknUS5DQFi8wOGU7jFm5Of2lFWt /SJ/D1fSs5Xuwh2mSPiaT191ER2RiAvou6AWdldt8CvFMiaia4YXLTBo1 OAARaANQKeh3LJkbi8dPuUBuh8OaH7hhADJs1NTllxg9rP9/zEi22qWgy g=;
X-IronPort-AV: E=Sophos;i="6.00,186,1681171200"; d="scan'208,217";a="216006891"
Thread-Topic: [saag] sntrup761x25519-sha512
Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO email-inbound-relay-iad-1a-m6i4x-96feee09.us-east-1.amazon.com) ([10.25.36.214]) by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 May 2023 14:31:07 +0000
Received: from EX19MTAUWB002.ant.amazon.com (iad12-ws-svc-p26-lb9-vlan2.iad.amazon.com [10.40.163.34]) by email-inbound-relay-iad-1a-m6i4x-96feee09.us-east-1.amazon.com (Postfix) with ESMTPS id AE44B45E99; Tue, 23 May 2023 14:31:05 +0000 (UTC)
Received: from EX19D001ANA002.ant.amazon.com (10.37.240.136) by EX19MTAUWB002.ant.amazon.com (10.250.64.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.26; Tue, 23 May 2023 14:30:54 +0000
Received: from EX19D001ANA001.ant.amazon.com (10.37.240.156) by EX19D001ANA002.ant.amazon.com (10.37.240.136) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA) id 15.2.1118.26; Tue, 23 May 2023 14:30:53 +0000
Received: from EX19D001ANA001.ant.amazon.com ([fe80::4f78:75cd:3117:8055]) by EX19D001ANA001.ant.amazon.com ([fe80::4f78:75cd:3117:8055%5]) with mapi id 15.02.1118.026; Tue, 23 May 2023 14:30:52 +0000
From: "Kampanakis, Panos" <kpanos@amazon.com>
To: Rene Struik <rstruik.ext@gmail.com>, John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>
CC: "saag@ietf.org" <saag@ietf.org>
Thread-Index: AQHZio3ay00q+rO7j0K/i2jctBbM569iE8FggAVoqcKAAGBeAIAACxuAgAAGUgCAAACWsA==
Date: Tue, 23 May 2023 14:30:52 +0000
Message-ID: <efff060c582142baae34894e12fea653@amazon.com>
References: <875y8y4ip2.fsf@kaka.sjd.se> <84296E62-5843-4E7A-BD43-430491A5A1F3@akamai.com> <874jo8ytgw.fsf@kaka.sjd.se> <f6aa133635084609b0032ab1cfbfb7ce@amazon.com> <87sfbny046.fsf@kaka.sjd.se> <CABcZeBME4CRjd+4kqFCzYOmaOEafUiabsBoUQ0Eqm8A7OD-46A@mail.gmail.com> <GVXPR07MB967860D559F5BA4F2F7D03BB89409@GVXPR07MB9678.eurprd07.prod.outlook.com> <a4a4d9b4-ffac-9f69-5034-db714afd4e1b@gmail.com>
In-Reply-To: <a4a4d9b4-ffac-9f69-5034-db714afd4e1b@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.106.179.5]
Content-Type: multipart/alternative; boundary="_000_efff060c582142baae34894e12fea653amazoncom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/JoaXuIiL-qgQzxcj_Ha-VFRggMc>
Subject: Re: [saag] sntrup761x25519-sha512
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 May 2023 14:31:15 -0000

Hi John,

+1 on Rene’s comment about X25519 for key agreement. Ed25519 was recently approved for signatures in FIPS 186-5, but not X25519 for key agreement.

+1 on Rene’s comment about removal of P384 too. Maybe after 2033 for CNSA 2.0. But still, for those with FIPS requirements (not selling equipment for NSS systems that need to comply with CNSA) will still need to be using a FIPS-approved curve for a few more years.

We could consider changes to the SSH HASH in draft-kampanakis-curdle-ssh-pq-ke. We could consider other more conservative combinations like X25519+Kyber768 and P256+Kyber768 as the TLS WG is doing. These initial methods were choices we made just for the initial version of the draft.

If only there was a WG where we could converge on these choices and ratify draft draft-kampanakis-curdle-ssh-pq-ke…  😉


From: saag <saag-bounces@ietf.org> On Behalf Of Rene Struik
Sent: Tuesday, May 23, 2023 10:20 AM
To: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>; Eric Rescorla <ekr@rtfm.com>; Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org>
Cc: saag@ietf.org
Subject: RE: [EXTERNAL][saag] sntrup761x25519-sha512


CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe.



Hi John:



To my knowledge, there is no NIST standard that approves the key agreement schemes X25519 and X448. As to CSNA2.0, I am not aware of removal of P-384 either.



If you can provide references to the relevant NIST specification(s), including section numbers, that would be great (I could not find this in [2]. Same for CSNA2.0 (including date of document, etc.).



BTW - Table 2 of [1] recommends use of SHA-384 or SHA-512 for all classification levels.



Ref:

[1] NSA - Announcing the Commercial National Security Algorithm Suite 2.0 (September 7, 2022).

Web link: https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF

[2] NIST SP 800-186 - Recommendations for Discrete Logarithm-Based Cryptography, Elliptic Curve Domain Parameters (NIST, February 3, 2023).

Web link: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-186.pdf



Rene



==

[excerpt of email John Mattson, Tue May 23, 2023, 9.57am EDT]

Regarding draft-kampanakis-curdle-ssh-pq-ke: Not sure that there is any reason to standardize P-256, P-384, P-521 anymore when X25519 and X448 are NIST approved and CNSA 2.0 removed P-384.

Also, I think the use of SHA-2 makes no sense as Kyber use SHA-3 internally. Why require a second hash function?
On 2023-05-23 9:57 a.m., John Mattsson wrote:

+1 for SECDISPATCH

+1 for Kyber instead

+1 for IND-CCA (unless made specifically for a protocol only needing IND-CPA)



Regarding draft-kampanakis-curdle-ssh-pq-ke: Not sure that there is any reason to standardize P-256, P-384, P-521 anymore when X25519 and X448 are NIST approved and CNSA 2.0 removed P-384. Also, I think the use of SHA-2 makes no sense as Kyber use SHA-3 internally. Why require a second hash function?



My view is that that the only combinations worth doing IETF standards track for are final standardized Kyber with X25519 or X448 and SHAKE.



NTRU and NTRU Prime are not good backup algorithms to Kyber as they also use structured lattices. If IETF wants backup algorithms, then ”FrodoKEM” och "Classic McEliece” recommended by many European countries are more conservative choices. Unfortunately, they are currently being standardized in paywalled ISO, which I think make them unacceptable for use.



(For signatures Sphinx+ is a very conservative alternative to Dilithium and Falcon)


Cheers,
John

From: saag <saag-bounces@ietf.org><mailto:saag-bounces@ietf.org> on behalf of Eric Rescorla <ekr@rtfm.com><mailto:ekr@rtfm.com>
Date: Tuesday, 23 May 2023 at 15:18
To: Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org><mailto:simon=40josefsson.org@dmarc.ietf.org>
Cc: saag@ietf.org<mailto:saag@ietf.org> <saag@ietf.org><mailto:saag@ietf.org>
Subject: Re: [saag] sntrup761x25519-sha512


On Tue, May 23, 2023 at 12:32 AM Simon Josefsson <simon=40josefsson.org@dmarc.ietf.org<mailto:40josefsson.org@dmarc.ietf.org>> wrote:
"Kampanakis, Panos" <kpanos=40amazon.com@dmarc.ietf.org<mailto:40amazon.com@dmarc.ietf.org>> writes:

> Hi Simon,
>
> I have asked this question to the ADs 3-4 years back and reopening
> CURDLE was not an option. Introducing PQ algorithms to SSH has also
> been discussed in SAAG before and the outcome was that there is no WG
> to do this work right now. So, imo AD-sponshorship is your only
> option.

Paul, Roman, what is your decision on AD-sponsoring
draft-josefsson-ntruprime-ssh?

If you are asking for AD sponsorship then this should go through th
SECDISPATCH process in SFO. That would structure this discussion
properly.


From your other message:

> One point of my draft is to give IETF change control.  The process was
> the same with RFC 8731 when we documented how Curve25519 was used in
> OpenSSH at the time.  Many implementations (including OpenSSH) now use
> the RFC 8731 algorithm identifier that is under IETF change control.

So to clarify, if the IETF decided to change the use of SNTRU in some way,
for instance, by changing the encoding, then the SSH community would expect
to change over to that code point and use?

-Ekr





_______________________________________________

saag mailing list

saag@ietf.org<mailto:saag@ietf.org>

https://www.ietf.org/mailman/listinfo/saag

--

email: rstruik.ext@gmail.com<mailto:rstruik.ext@gmail.com> | Skype: rstruik

cell: +1 (647) 867-5658