[lamps] OID für KEM?

"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Fri, 08 October 2021 16:48 UTC

Return-Path: <prvs=691527a907=uri@ll.mit.edu>
X-Original-To: spasm@ietfa.amsl.com
Delivered-To: spasm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D714E3A08FF for <spasm@ietfa.amsl.com>; Fri, 8 Oct 2021 09:48:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2YMx90poFePJ for <spasm@ietfa.amsl.com>; Fri, 8 Oct 2021 09:48:51 -0700 (PDT)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28AD23A08D9 for <spasm@ietf.org>; Fri, 8 Oct 2021 09:48:47 -0700 (PDT)
Received: from LLEX2019-3.mitll.ad.local (llex2019-3.llan.ll.mit.edu [172.25.4.125]) by MX2.LL.MIT.EDU (8.16.1.2/8.16.1.2) with ESMTPS id 198Gmfv1393546 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL) for <spasm@ietf.org>; Fri, 8 Oct 2021 12:48:41 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=I7b/afddaSxFM+W28/vUCNNJcwL/6J1VSk+0XzaMeqrdTb4qCW6xLvhFgukbeGPA25J1QJy1FRU3eadBHYC8z5DcpIWmSO4lBIJy/qWy4EBUmN0fgWVTDxgBzz25WlWJQo+QL7bEA0HQD9bcDefXaHAdvf0Ppe+M1WIcnjCTgpH5kdFaxCUMJrD9LQGKwSb/HePf5IHmaocCycXKEuBCoLMHnB7lpVfWgkHMhsor5zGmawU/9dJOl1hvRX1ILccN1+becQKZ/XYlZPqu6HI7fsu1LjDA8SPfpXqb3b/89biKeNcbAJ3ENN5rJpgSULpotD/iNFMof6oxNjBfBj03hQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Tav0DQqVSnICuT/5hmwxCAXsSI8F3WwMMl5HSm2Au9M=; b=wADS9IHPvgIhnS0es8zp4hvyRrtcXLSo6jL+Ztaru9RMGzs7ozV9rPG5jh6+hRWqBUa9b+00ot2iVcRqdDLxOg9ADTH93UuzbzctC8VUWSGlyU3Hu6zFHq+LbdMKjaUazgL++AJCEuXONv7XQ1GSwc84b0j7p6xBr3GzXLmMVwIjIowkjybDYFs0h58aL/ujm9zCU/MUW656kPRj80ftjDX8VIHV+LSFVKsqSqI/W1i0YrDs5PuO1i5aCoSojERrZQ2tmb6mudpr9WpOPiUhcCCE3hkW4Mll7nOWA3/K8n9FRVkasO1tc6C5lCkIVHc7Vml0RcEW7VlUH182SZvg+Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: LAMPS WG <spasm@ietf.org>
Thread-Topic: OID für KEM?
Thread-Index: AQHXvGRWhcj346/cM0CZhvsQ6ENjEQ==
Date: Fri, 08 Oct 2021 16:48:36 +0000
Message-ID: <5BA17D7A-F19D-474B-8DD8-8EB36A363818@ll.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ll.mit.edu;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: db982c78-8847-437b-a0cc-08d98a7b78fd
x-ms-traffictypediagnostic: BN1P110MB0866:
x-microsoft-antispam-prvs: <BN1P110MB086612CD5AFBA8CF75DB8B5D90B29@BN1P110MB0866.NAMP110.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN1P110MB0706.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(366004)(66946007)(66476007)(66446008)(64756008)(66556008)(8936002)(86362001)(76116006)(122000001)(224303003)(186003)(83380400001)(498600001)(38070700005)(4744005)(2906002)(2616005)(75432002)(33656002)(99936003)(6916009)(71200400001)(6512007)(6506007)(5660300002)(6486002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/signed; boundary="Apple-Mail-695A5FD7-DCAF-4498-BAC1-EE2BF69518AA"; protocol="application/pkcs7-signature"; micalg="sha-256"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN1P110MB0706.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: db982c78-8847-437b-a0cc-08d98a7b78fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Oct 2021 16:48:36.3694 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN1P110MB0866
X-Proofpoint-GUID: G5cGWLta_ff-qkG6QEP-WX78E4qX9ePu
X-Proofpoint-ORIG-GUID: G5cGWLta_ff-qkG6QEP-WX78E4qX9ePu
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-10-08_05:2021-10-07, 2021-10-08 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 mlxscore=0 spamscore=0 bulkscore=0 malwarescore=0 adultscore=0 mlxlogscore=605 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109230001 definitions=main-2110080094
Archived-At: <https://mailarchive.ietf.org/arch/msg/spasm/7d-TJDZYmlNfgI7NhL1RSHxU9Dg>
Subject: [lamps] OID für KEM?
X-BeenThere: spasm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is a venue for discussion of doing Some Pkix And SMime \(spasm\) work." <spasm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spasm>, <mailto:spasm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spasm/>
List-Post: <mailto:spasm@ietf.org>
List-Help: <mailto:spasm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spasm>, <mailto:spasm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Oct 2021 16:48:59 -0000

There was a discussion here some time ago regarding NIST PQC KEM candidates, and assigning them OIDs for use in various protocols. 
The conclusion at  that time was that an OID should identify not just the bare-bones algorithm, but the suite the KEM in question is made a part of. 

I now need to define a certificate that would authenticate PQ public key for use in a variety of non-public (yet) protocols that utilize KEM. That means - I need to identify the algorithm this public key is for, and not bother with differentiating between different protocols that may use this KEM and therefore this public key. 
I understand that I can create an Algo Identifier myself, but my preference is something with broader acceptability and interoperability. 

What does the WG think? Any recommendations?

Regards,
Uri