Re: [TLS] OPTLS: Signature-less TLS 1.3
Hugo Krawczyk <hugo@ee.technion.ac.il> Sun, 02 November 2014 22:24 UTC
Return-Path: <hugokraw@gmail.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68D531A1A65 for <tls@ietfa.amsl.com>; Sun, 2 Nov 2014 14:24:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 3.223
X-Spam-Level: ***
X-Spam-Status: No, score=3.223 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, J_CHICKENPOX_12=0.6, J_CHICKENPOX_46=0.6, J_CHICKENPOX_55=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1yw7FYYQ7YPy for <tls@ietfa.amsl.com>; Sun, 2 Nov 2014 14:24:46 -0800 (PST)
Received: from mail-la0-x229.google.com (mail-la0-x229.google.com [IPv6:2a00:1450:4010:c03::229]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EB131A1A8A for <tls@ietf.org>; Sun, 2 Nov 2014 14:24:43 -0800 (PST)
Received: by mail-la0-f41.google.com with SMTP id s18so4092425lam.28 for <tls@ietf.org>; Sun, 02 Nov 2014 14:24:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=Xs8MTiPXCppnsU26SeJ4raacwSpdYo7AeOjmeMTfA6Y=; b=u05/Z3rQ/ImHGIOAze1D3D+MjB0fTqK2+hXiqBd1o7i6g2mfPHNeN9QLNvrUT/pzJS mNfiQ0YcBvV9LIEvK0IlzczaS6Q+Tmdy3kZquIofVvPm+iWZ04wb2jLAzsqrvLqxRAyo qYCs4wOAOzNYo3tBY/rs5oX2u7DmEamLU2C7PTfHQEER1BauWN/koABXwpPDmM8Sz66c qL79El5GjLmERA6VFZB89FsGaXpFyJPA87qrIjfRN0Q3ayvuADVgjgPXjesZ/0MrSh/0 6ZQVTcQpfm18LSokop/E/fZJo1sv1w+6kzLDuqJrwg2UPgRpA8a82/9t7FZbL1WaFXJZ raIQ==
X-Received: by 10.152.36.33 with SMTP id n1mr8042795laj.95.1414967081587; Sun, 02 Nov 2014 14:24:41 -0800 (PST)
MIME-Version: 1.0
Sender: hugokraw@gmail.com
Received: by 10.25.78.20 with HTTP; Sun, 2 Nov 2014 14:24:11 -0800 (PST)
In-Reply-To: <CACsn0cmmtUY17gMk537p8EiXuR3sNMb+rHY2b2nfK3S7-TE+1Q@mail.gmail.com>
References: <CADi0yUObKsTvF6bP=SxAwYA05odyWdzR1-sWutrDLUeu+VJ1KQ@mail.gmail.com> <CABcZeBNQBC1XXFR5sGo=V8WmxmL5thaBpeHSasy3SordbqNRTQ@mail.gmail.com> <CABcZeBMEmoR18O0-NjuEeoPGTTVuOrwa_WM8YBiS=yd5-NWMbA@mail.gmail.com> <CACsn0cmmtUY17gMk537p8EiXuR3sNMb+rHY2b2nfK3S7-TE+1Q@mail.gmail.com>
From: Hugo Krawczyk <hugo@ee.technion.ac.il>
Date: Mon, 03 Nov 2014 00:24:11 +0200
X-Google-Sender-Auth: hwIK6wjGIO1mMUYO_HzxOziHJ8s
Message-ID: <CADi0yUNCGAVvqFF9t1X+gRf36iHsxZOFOVacA=PfrV9-JcArqQ@mail.gmail.com>
To: Watson Ladd <watsonbladd@gmail.com>
Content-Type: multipart/alternative; boundary="089e0158b7ea445b900506e7b2b9"
Archived-At: http://mailarchive.ietf.org/arch/msg/tls/0UL-hmBA2EmxO7vpzH8vhpHZKyo
Cc: "tls@ietf.org" <tls@ietf.org>, Hoeteck Wee <hoeteck@alum.mit.edu>
Subject: Re: [TLS] OPTLS: Signature-less TLS 1.3
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 02 Nov 2014 22:24:49 -0000
On Sat, Nov 1, 2014 at 7:15 AM, Watson Ladd <watsonbladd@gmail.com> wrote: > Dear Hugo, > > There are some issues I can see: > > -Servers already supporting ECDSA certificates seem to not win. If I'm > understanding correctly, a server does three exponentiations, one of > which can be optimized by ephemeral reuse, when using ECDSA+ECDHE. The > servers that win are the ones with RSA certs. The only way to win vs > ECDSA is if DH only permits faster exponentiation, which it does, and > removing the ancillary junk in ECDSA. However, here we have two > variable base exponentiations after ephemeral reuse, as opposed to one > fixed, one variable, so there is a loss in performance on the same > group, made up for by removing inversions modulo the group order. > Don't forget that 0-RTT cannot be supported with a signature-based protocol so in that sense going to static DH is a win-win. As for performance, the gain with respect to (per-session) RSA signatures is huge. Comparison with ECDSA is indeed more complex as you point out, but static DH wins in comparison to the sign+verify performance and saves many complexities related to ECDSA optimization and (re)definition. It also avoids the vulnerability of Schnorr-like signatures where leakage of one ephemeral value compromises the long-term signature key. In contrast, static DH keys do not leak even if all ephemeral values are disclosed. Furthermore, one can design the protocol so that the disclosure of the ServerKeyShare does not even compromise the session key that uses this value. > > -I'm interested to see how different this is from ntor.[0] (To my eyes > it is very similar, which may make proving easier. OTOH, the 0-RTT and > 1-RTT options require care). Similarly, Michael Backes and coauthors > have proposed Ace[1], which does similar tricks to HMQV to reduce > server side cost, and provides a key exchange with some similar > properties. > I am not familiar with these works, but it is too early to compare with other protocols as this one is yet not fully specified. Its details will be set when we get a better understanding of what is needed. One important element here is that we will be defining several key derivation operations and we will need to prove (appropriate) security with respect to each such key. > > -Estimations of the cost of group computations require care: while > those in the original email are correct, the estimates for shared-base > and multibase have to take into account the existence of ladders. A > seeming optimization might force the use of a slower representation. > In genus 1 this is no longer an issue. > I am not expert in implementing EC operations so I will appreciate any guidance regarding these aspects of the protocol. > > -We've already had controversy on the list about removing > renegotiation as a mechanism for client authentication. While I would > really like to see a symmetric client authentication method, the fact > that some people want to change the client authentication state in the > middle of the connection limits the kinds of options we have. (I don't > know what exactly the requirements are or how they limit the options, > but I remember this being raised in an earlier proposal for removing > renegotiation) > > None of these issues look like showstoppers to me. I think the > benefits of this proposal, particularly with regards to 0-RTT and > 1-RTT exchanges where there is a solid proposal as opposed to none at > all, significantly outweigh the minor disadvantages. It opens the door > to massive performance increases by removing a dependency on signing, > and the consequent annoyances. And lastly, it will hopefully have a > proof that is understandable by humans with reasonable assumptions. > That's the goal. Hugo > > Sincerely, > Watson Ladd > ----- > > > [0] http://cacr.uwaterloo.ca/techreports/2011/cacr2011-11.pdf > [1] https://www.infsec.cs.uni-saarland.de/~mohammadi/paper/owake.pdf > > On Fri, Oct 31, 2014 at 6:59 PM, Eric Rescorla <ekr@rtfm.com> wrote: > > P.S. At first glance this kind of design seems to have some really nice > > properties and wouldn't be too hard to modify the draft (and > > implementations) > > to support. I'm looking forward to hearing what the WG thinks. > > > > Best, > > -Ekr > > > > On Fri, Oct 31, 2014 at 6:44 PM, Eric Rescorla <ekr@rtfm.com> wrote: > >> > >> Hugo, > >> > >> Thanks for writing this up. I'm still digesting this, but I had a few > >> questions. > >> > >> 1. In the interim, I believe you suggested MAC of the transcript under > >> g^{xs} to authenticate g^y. This is fairly analogous to > CertificateVerify, > >> except using a MAC rather than a signature. In the current design, you > >> instead generate a combined key from g^{xs] and g^{xy}. Are there > >> advantages to this design or is it just a matter of style? > >> > >> 2. I'm thinking about how to adapt this to PSK+PFS modes (i.e., > >> where you want the PSK for authentication but you want to do > >> a DHE exchange for PFS). In the design you propose, it seems > >> like the analogous thing to do would be to treat the PSK like > >> g^{xy}? Does this interact at all with whether to mix the keys > >> or use a MAC? > >> > >> 3. WRT client auth, I think we've generally decided that the client's > >> certificate ought to be encrypted. Given that, I wonder if it would be > >> easier > >> for the client to just do a digital signature over the transcript and/or > >> an authenticator derived from the secret. Generally, the additional > >> cost of the RSA signature isn't a huge problem for most clients and > >> those which do should be able to quickly move to EC-based keys. > >> > >> Thanks, > >> -Ekr > >> > >> > >> On Fri, Oct 31, 2014 at 5:54 PM, Hugo Krawczyk <hugo@ee.technion.ac.il> > >> wrote: > >>> > >>> During the TLS interim meeting of last week (Oct 22 2014) I suggested > >>> that TLS > >>> 1.3 should abandon signature-based authentication (other than for > >>> certificates) > >>> and be based solely on a combination of ephemeral Diffie-Hellman for > PFS > >>> and > >>> static Diffie-Hellman for authentication. This has multiple benefits > >>> including > >>> major performance gain (by replacing the per-handshake RSA signature by > >>> the > >>> server with a much cheaper elliptic curve exponentiation), > compatibility > >>> with > >>> the mechanisms required for forward secrecy, natural accommodation of a > >>> 0-RTT > >>> option, and a simple extension without signatures for client > >>> authentication. > >>> > >>> Below I present a schematic representation of the proposed protocol > >>> referred > >>> to as OPTLS where OPT stands for OPTimized and/or for One-Point-Three. > >>> The presentation is sketchy and omits the exact procedure for key > >>> derivation. > >>> The latter is a crucial component for the security of the protocol, but > >>> before getting into these details we want to get a sense of whether the > >>> WG is > >>> interested in this approach. In the meantime, Hoeteck Wee and myself > are > >>> working on the details of the protocol and the security proof. > >>> > >>> We describe a setting with optional 0-RTT and server-only > authentication. > >>> Client authentication can be added as a further option or as an > extension > >>> (similar to the current 1.3 proposal) - see below. > >>> > >>> NOTATION AND TERMINOLOGY: > >>> > >>> [K] symbols represent pointers to key material whose exact derivation > is > >>> not > >>> included here except for specifying the basic DH values from which the > >>> key is > >>> derived (actual derivation will include further information similar to > >>> the > >>> extended hash mechanisms or SessionHash proposal considered for 1.3). > >>> Asterisks represent optional fields that the WG can decide to leave as > >>> optional, > >>> mandatory, or simply remove without changing the core cryptographic > >>> security of > >>> the protocol. All references to encryption mean "authenticated > >>> encryption" > >>> using the encrypt-then-mac paradigm (or any other secure AEAD > mechanism). > >>> > >>> KeyShare's represent ephemeral Diffie-Hellman values exchanged by the > >>> parties. > >>> All the public key and Diffie-Hellman operations are assumed to happen > >>> over a > >>> cyclic group with generator g of order q (typically implemented by an > >>> elliptic > >>> curve group). We use multiplicative notation where ^ denotes > >>> exponentiation as > >>> in g^x, g^{xy} (here xy denotes multiplication of the scalars x and y), > >>> etc. > >>> Omitted from the current high level description is a mechanism for > >>> testing group > >>> membership of DH values or cofactor exponentiation (the specific > >>> mechanism > >>> depends on the group type and is typically very efficient for elliptic > >>> curves). > >>> > >>> SERVER PUBLIC KEY AND CERTIFICATE: > >>> > >>> The server has a long term private-public key pair denoted by (s,g^s) > >>> where > >>> s is uniform random in [0..q-1] (we refer to s and g^s as "static > keys"). > >>> We assume that the server has a certificate that includes the server's > >>> public > >>> key g^s and a CA-signed binding of this key to the server's identity. > >>> We discuss the implementation of such certificates below. > >>> > >>> PROTOCOL OPTLS: > >>> > >>> ClientHello > >>> ClientKeyShare > >>> ClientData* [K0] --------> > >>> ServerHello > >>> ServerKeyShare > >>> ServerCertificate* [K1] > >>> ServerFinished [K2] > >>> <-------- ServerData* [K2] > >>> ClientFinished* [K2] --------> > >>> > >>> > >>> Protected Application Data [K3] > >>> <-------> > >>> > >>> > >>> > >>> 1-RTT CASE: > >>> > >>> The basic 1-RTT case omits the ClientData* field. It includes a > >>> ClientKeyShare > >>> g^x and a ServerKeyShare g^y and an optional (encrypted) server > >>> certificate. > >>> If the certificate is sent (it can be omitted if the client has > indicated > >>> that > >>> it knows the server key as in the case in the 0-RTT scenario) and is > >>> encrypted, > >>> the encryption key K1 is derived from g^{xy}. > >>> > >>> Key K2 is an encryption key derived from both g^{xs} and g^{xy}. It is > >>> used to > >>> authenticate-encrypt the ServerFinished and ClientFinished messages > >>> (which > >>> include a hash of the previous traffic) and to encrypt data from the > >>> server if > >>> such data is piggybacked to the second message. > >>> > >>> Key K3 is the "application key" used to derive key material for > >>> protection of > >>> application data. This key material will include (directional) > >>> Authenticated > >>> Encryption keys and, possibly, keys for derivation of further re-key > >>> material. > >>> K3 is computed from both g^{xs} and g^{xy} similarly to K2, but its > >>> derivation > >>> will be different than K2, e.g., using a separating key expansion > >>> technique. > >>> > >>> SUPPORT FOR 0-RTT: > >>> > >>> The above protocol is compatible with a 0-RTT protocol such as QUIC. In > >>> this > >>> case, the client is assumed to have information about the server's > public > >>> key > >>> and other security parameters. The server is assumed to have some > >>> mechanism in > >>> place for detecting replay (e.g., via timestamps, stored client nonces, > >>> etc.). > >>> The resulting protocol is as described above where the ClientData field > >>> is sent > >>> encrypted under key K0 derived from g^{xs}. > >>> The rest of the protocol is identical to the above. > >>> Note: In this case, ServerCertificate is not sent as the client had to > >>> know > >>> the server's public key before the first message (one can imagine a > >>> setting > >>> where the server may send a different certificate in the second > message - > >>> if > >>> desired, this can be accommodated too as an option or extension). > >>> > >>> CLIENT AUTHENTICATION: > >>> > >>> Client authentication can be supported via an option or extension. It > >>> would > >>> include a client certificate for a static DH key g^c sent in the third > >>> message > >>> (the certificate can be encrypted under key K2 to provide client's > >>> identity > >>> protection). In this case, the key for computing the ClientFinished > >>> message and > >>> the application key K3 would be derived from a combination of the > values > >>> g^xy, > >>> g^xs, g^yc (and possibly also g^{cs}). > >>> > >>> NOTES: > >>> > >>> Note on Finished messages: The above spec sets ServerFinished as > >>> mandatory and > >>> ClientFinished as optional. The latter option is needed for a 1-RTT > >>> protocol. > >>> In principle, both Finished messages could be omitted and still obtain > >>> security > >>> via implicit authentication (assuming the inputs to key derivation are > >>> chosen > >>> appropriately). But given the advantages of ServerFinished for > providing > >>> explicit authentication, key confirmation, and active forward secrecy > >>> (see > >>> below), it seems advisable to always include it. Including > ClientFinished > >>> provides key confirmation from client and also explicit client > >>> authentication > >>> when client certificate is included. ClientFinished also provides > >>> Universal > >>> Composable (UC) security (this is a result of the Canetti-Krawczyk > proof > >>> that > >>> CK security implies UC security when a client confirmation step is > >>> included). > >>> > >>> Note on certificates: Since in current practice servers hold > certificates > >>> for > >>> RSA signature keys rather than for static DH keys, the certificate > field > >>> in the > >>> above protocol will be implemented by a pair consisting of (i) the > >>> server's RSA > >>> signature certificate and (ii) the server's signature using this RSA > key > >>> on the > >>> server's static public DH key g^s. The latter signature by the server > is > >>> performed only when a new static DH key is created (how often this > >>> happens and > >>> how many such keys are created is completely up to the server - it has > >>> the > >>> advantage that these keys can be changed often to increase security > >>> against > >>> leaked keys). This use of RSA also enjoys the high efficiency of RSA > >>> verification for the client. > >>> The handling of Client certificates would be similar. > >>> > >>> Note on forward security (a.k.a. as PFS for Perfect Forward Security): > >>> PFS is provided by the (mandatory) use of ephemeral Diffie-Hellman > keys. > >>> The meaning of PFS is that an attacker that finds the (long-term) > static > >>> private keys of the parties cannot compromise past session keys. > Without > >>> the > >>> ServerFinished message the above protocol ensures forward secrecy > against > >>> passive attackers (i.e., for sessions where the attacker did not choose > >>> g^y). > >>> With ServerFinished, PFS holds also against active attackers. A > similar > >>> consideration applies to ClientFinished. > >>> > >>> Client certificates in the first message: We note that in cases where > >>> client > >>> certificates can be sent in the clear in the first message of the > >>> protocol, one > >>> can provide PFS and mutual authentication in a 1-RTT at essentially the > >>> same > >>> cost of an unauthenticated DH exchange (i.e., a cost of little more > than > >>> two > >>> exponentiations). In such a setting one can also obtain mutual > >>> authentication in > >>> a 0-RTT protocol (with forward secrecy with respect to the client's > key). > >>> These options, however, require HMQV-like mechanisms and may raise IP > >>> issues (this > >>> can be investigated further if the WG is interested). > >>> > >>> > >>> _______________________________________________ > >>> TLS mailing list > >>> TLS@ietf.org > >>> https://www.ietf.org/mailman/listinfo/tls > >>> > >> > > > > > > _______________________________________________ > > TLS mailing list > > TLS@ietf.org > > https://www.ietf.org/mailman/listinfo/tls > > > > > > -- > "Those who would give up Essential Liberty to purchase a little > Temporary Safety deserve neither Liberty nor Safety." > -- Benjamin Franklin >
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Rene Struik
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Rene Struik
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nikos Mavrogiannopoulos
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Ilari Liusvaara
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Manuel Pégourié-Gonnard
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hanno Böck
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Peter Gutmann
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Martin Thomson
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Martin Thomson
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Martin Thomson
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Andy Lutomirski
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Andy Lutomirski
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Daniel Kahn Gillmor
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Daniel Kahn Gillmor
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Martin Thomson
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Daniel Kahn Gillmor
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Martin Thomson
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Eric Rescorla
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Yoav Nir
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Daniel Kahn Gillmor
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Yoav Nir
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Daniel Kahn Gillmor
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Yoav Nir
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Nico Williams
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Salz, Rich
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Blumenthal, Uri - 0558 - MITLL
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Watson Ladd
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Salz, Rich
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Dan Brown
- Re: [TLS] OPTLS: Signature-less TLS 1.3 Hugo Krawczyk