[TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"

Daniel Apon <dapon.crypto@gmail.com> Tue, 07 April 2026 01:26 UTC

Return-Path: <dapon.crypto@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id CE04BD7437B4 for <tls@mail2.ietf.org>; Mon, 6 Apr 2026 18:26:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775525213; bh=ZKmXKxx2++DzjZP1Xr7YvoV5xsDZi9VKw5kaAGWhcWs=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=nQM/S9wBpL3jns+QFzDPGz7PbMTxR9w88AkP7jULhC9w+IY139gRuOuYjXdLcNana 0GvYPIHsP7zqAmwiGPfmR00jep0mKMJ0CGybWdR1bjXfvMhEL6JDpDcufpVX7YI1Bd vlt4IXNnUK9+j6Kyjm1MrBt7S1pgtWDQCI8Gbl0k=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dltx-2EJV4S0 for <tls@mail2.ietf.org>; Mon, 6 Apr 2026 18:26:52 -0700 (PDT)
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [IPv6:2a00:1450:4864:20::135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4801AD7437AD for <tls@ietf.org>; Mon, 6 Apr 2026 18:26:52 -0700 (PDT)
Received: by mail-lf1-x135.google.com with SMTP id 2adb3069b0e04-5a3af1b7549so3989767e87.1 for <tls@ietf.org>; Mon, 06 Apr 2026 18:26:52 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775525211; cv=none; d=google.com; s=arc-20240605; b=aQ/jqqZOPx4DpJ0rwDsYNwTeg0WW0NeWPZYD4dHsxXczJzIRjiJaDl7fnS857N/I4s nnOE7iPs5F9jCFp9i/y9qXGiL6TEB/wESNDg/5wLNKg+QUfgE0L9VFMDex0KAI16YxdF LB4tO3bKO1NVRBZT0eRc24YYVwjvvCYvTMXFiYlvUMpkEHi3Nn9mlJYI3FG/GsrNxSVV VPv6gqPinRB+zt7NBc4OelmyFgILsCy1y5RXVqhylg6N7oHo4qj9xpoorMpOA1VNmm+8 vhDTC+Sd/M1W0g6qphvPBEMBFDqjzl7zfXvwOTN5a90tBeMtVPo3cwbp65f9y2Ktc8E7 43cA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; fh=AgPIZtcZamt/v8BtHfNFPke5ZNYhfd++QLxrPUavzMI=; b=fUBlV0CA509WnfLdQCRNjh38TzFrSIOTO8+38pYvLm5D5Z0KkdWN1VUH4BsZNDh1dZ y8wp2eoLnULSxpuK+phw/m33WNgS8Yl0dN730HFplW6cmrqCt50hljXObuSKTOQDlRlx k344bS+yfZL4Lvj1RBBfwidk01S+OMcwUbiZzd7rxdFrIkEYySu8T9V4G6UIJcdSDqX4 aF3XCk5zL2cjMGJhApIn7T1oHUCyDKbC0g9FLMSqJSeYVHaYv8bBIOa/noUFz/e42Ukh /yyGyc/z/Zku+QYWyBhc3JYsXeagsC3mgS4i3246Cv54CX86m1tqjOvUTi4W+EgYt6XT 2F1w==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775525211; x=1776130011; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; b=hEoK12ci9Ipih4dkYuI2xIf7+9UwAk3Py/xy/aaJdJ0Ljyt9hGrXAhamQ+THKkjyfP wSeQa42ZGagVZ/vMcmxMUExKqUD0L+XoPgSC/F94qxUYTDpcKqKJ1iuGCO3+lalMfg9q HE/83F3Y80p5SjQFyY4+XrvvqiZQfS45NFVR3tToi8BkoD1CGbCrAuFtncTWIuA2IKJv aRR6zAlT4Dj1jMap3WlyOPik2d7x1whkDRDccXNIT8YQAI0dabSsWBuwjpe7RdjgugHm DDfuwwPg4/eIQKHKTL8Ij+ez59P5deaICsHt3+f9Hs50dQCoOzFkC53RHaKWY1iX4UYq 6p9w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775525211; x=1776130011; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; b=QZG6vWtNw8WdvaWWOEeWs5UQT8hlT//I9z9QyGX+p/JL+s1Xi+Bw6d4ExCW4Y5nvi/ XktAQHJRpNy0GexOtMI2tpIMZSXdJsfG6NPnhgrozNA+yQYAC0DwL5582BpfYsSLKt3H 58AsXvTJxgv0kIWqsa3pOgD1awhdcNw69vAdDnuTu5yOXdKT0GQHEGy3gc4LipWc2ACE jPQzfgwVPwfhD9v/nu5uRCh3fVh6wivIrvhrArk8V30H261ARPOkfOpnrRht012jcWNx mJWYCfyxaSg9jIg43amNs4E2Y96WxD/iW7dDolzerTNPQAhIQ0mSHJmejPFhFzKFhdCO VPnw==
X-Forwarded-Encrypted: i=1; AJvYcCVs27eaOO4FMQQu9X7bJU84ynFgmK79rnJjs7tRvkuK0dazLgxWcKAfbqHnxAnSon7J/Mg=@ietf.org
X-Gm-Message-State: AOJu0YxdVGp32o5bBxxoMCJWgfP4Yj8j66gs6RGeuIPj/KV8sU9oDtx0 HnSFopTF4Ed1pUt7yEOaivoKflnfSigWDgH0gx/rbqnzgj8G2dUlqcNRA58OTRL9vtc7vGc6LGz P7bEMw0MegXZ9eW87+QvVeQT6Elynzr8=
X-Gm-Gg: AeBDievWqxXa43QI55bTrY/q7nAkkqxzvXmqvVc9zZOPAXdudxdM3C3YDGQcCh/Qlhw eVfW8fB5av+oRCWyhEnY5+8vkKsiJ68larIg0IKw3cwMyndhH4T9csNwdA+ttlEYzlqpVHGI1Mx jcjJ1BEfFSAq9QucGxAOpobSh46Gu1al82V7QFEFlvMJngZfbDkVZL234hbZZzR3qJr3VtBttDO 6wWQPdIVxIfoSZRHuQR0vaQjpjBuTEErGO2pyikS2hwjU6+XGf41pmj3kccZdWgWGfy6k3uHO/g jvZXSMQU/5PkxVt3ONDSzt2Ai9PT67waM2Zv1xCnV/Y9Q9IXHA3Hn8pKytcdNPg13FVHWqbt4Wc MdXvdNpkImF9TZdYNYgx0CBkWK0hc8VOPt7Z5f2qcyWUA/XbHBY2dHPlxvp2mRWBX3OIs
X-Received: by 2002:a05:6512:3096:b0:5a2:c6f2:c217 with SMTP id 2adb3069b0e04-5a337558230mr4661917e87.14.1775525210481; Mon, 06 Apr 2026 18:26:50 -0700 (PDT)
MIME-Version: 1.0
References: <CAF8qwaBcotZqOnY2qJ6d0fRoa=5v0sZTOSWqeqkou+bLJcy9LA@mail.gmail.com> <CABcZeBPr+WeivTWpSCVC4f95fRuSiOytvvBPB_6r+af9Didhgw@mail.gmail.com> <CEB84168-5998-432A-9D62-36E28B9CDFA5@vigilsec.com> <CABcZeBM-eoqh+kJ7H6SiwC9p4tKAt+YiQhzetJZJmPNpXc+5OA@mail.gmail.com> <CAF8qwaALDXR6d=jLD46wXmKHDjyj=OdJ1X3a1AgxF+ByQceeMg@mail.gmail.com> <697d6134-0083-4933-8531-9be49118be7d@cs.tcd.ie> <adCCIZsvHqgci5LT@chardros.imrryr.org> <597455e4-29e1-46a0-a9a7-b87c5adbaec7@cs.tcd.ie> <adFBMGhVMOl2eptE@chardros.imrryr.org> <34c6c882-4cef-4350-9afa-0edb0b460eb6@cs.tcd.ie> <adHR1YEW-mPEb_BT@chardros.imrryr.org> <MEAPR01MB36540326A63FD5EAB70F652BEE5CA@MEAPR01MB3654.ausprd01.prod.outlook.com> <CAPxHsS+fv2S_Ydub24AHnFJUESxkr=h1me5NEtdsZ4bCqAip-Q@mail.gmail.com> <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de>
In-Reply-To: <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de>
From: Daniel Apon <dapon.crypto@gmail.com>
Date: Mon, 06 Apr 2026 21:26:37 -0400
X-Gm-Features: AQROBzAUBCXVoxNaWbcu9x-35csyYjUwLqxnf0I_Pj93EDgvruDZoaI4wE5PAhw
Message-ID: <CAPxHsSLdspKfUsnewD03ez0x-bN-DXFY_zu=yuzzkTq9M=i1Ew@mail.gmail.com>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Content-Type: multipart/alternative; boundary="00000000000075e817064ed4adcf"
Message-ID-Hash: WSGIPDGJOXEEAB4JUY3WQHJXKY5JSNG5
X-Message-ID-Hash: WSGIPDGJOXEEAB4JUY3WQHJXKY5JSNG5
X-MailFrom: dapon.crypto@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tls@ietf.org" <tls@ietf.org>, Peter Gutmann <pgut001=40cs.auckland.ac.nz@dmarc.ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/2I6XpxSk0rwBixmKg3gMAc68TRc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Responding to Usama's message (which Usama quoted to Uri, in response to
Uri's question about whether Usama had answered my (Daniel's) question):

First, thank you Usama for pointing me to the proper text off-list, so that
I didn't mis-quote the context!
Let me try to go through this point by point [[Standard apologies for
length]]:



"On 06.04.26 02:16, Daniel Apon wrote:

I remember, and enjoyed, your talk slides about an abacus and a dog.

[Usama wrote:] Could someone please share a pointer to slides?"

Sure!
I'm not sure if there are multiple versions, but here is one I found (now)
from Peter Gutmann's academic website:
https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf
The relevant material is also encapsulated in an ePrint PDF (with status
"Preprint") at: https://eprint.iacr.org/2025/1237.pdf

Going through the details of that presentation is mostly off-topic, other
than I'd like to point out (since Uri asked Usama "whose expert opinion,
beside Dr. Bernstein's, are you willing to accept?") that apparently Dr.
Bernstein and I agree on at least one significant point here. See
https://en.wikipedia.org/wiki/Scientific_wager with:
"In 2023, John Preuß Mattsson bet $2,050 that [RSA-2048] will withstand
quantum computing until at least 2050. Daniel J. Bernstein, John Sahhar,
Daniel Apon, and Michele Mosca accepted the bet.[cf.
https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/dezGXaKNNlU ]"

What fun. :) Back to the thread:


=====


"On 06.04.26 02:16, Daniel Apon wrote:

Also, I suppose "the middle distance" is Google's 2029 deadline now.

[Usama wrote:] That seems a little off-topic. Google's 2029 deadline is an
internal corporate roadmap and does not seem technically relevant to this
LS or the IEEE 802.11bt project."


It is fairly significant in the real world, and therefore, I believe,
on-topic: Google's adoption of this or that cryptographic technology
influences an immense & overwhelming amount of Internet traffic.
Indeed, when Google swapped to ECC by default in 2013, it constituted
something like 80%+ of the global adoption of ECC as a cryptographic
technology (over, previously, RSA).


=====


Continuing, Usama writes:

"IEEE 802.11bt project mentioned in the LS states

As an example, the United States National Institute of Science and
Technology (NIST) will disallow use of key establishment and digital
signatures based on classic cryptography for use in US government systems
after 2035.

Motion TGbt-M-16 [4] that is approved at IEEE 802.11 and that resulted in
this LS also has no such urgency as Google's 2029. As noted in [
https://www.ieee802.org/11/Reports/tgbt_update.htm ], the relevant
regulatory deadline (NIST) is 2035."


Well, first, NIST's instruction was written before the recent advances by
Google Research. Moreover, the deadline that NIST is stating (cf. original
source https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf
from *November
2024*) should be viewed in context as the final deadline for the final
adopters. It certainly is not the expected timeline for most adopters, and
surely NIST may want to review that timeline and revise it based on new
information (now 18 months later) at their discretion.

The slowest adopters in the world will be the
least-cryptographically-relevant U.S. Federal bureau -- someone like the
USDA Forest Service, who is responsible for managing 193 acres of national
forests, with little attention (or need for attention) to cybersecurity in
their remit. (My sincere apologies to all of the honorable and faithful
Forest Service employees who read this thread; I really didn't mean to pick
on you.)

So, my basic point remains: If Google is transitioning to PQC with a
deadline of 2029, then that will constitute a Very Large Fraction of the
world's communications, particularly over TLS. It makes it a reasonable
timeline to frame the discussion.


=====


More to the essence of my reply, there are two points I'd like to make.

First, Usama writes:

" I sense no urgency in the LS. A publication within two years seems
aligned with their timeline [
https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx
]."

Indeed, it seems that IEEE 802.11 has set approximately two years for their
closing (as of their November 2025 document here).
It seems what I was referencing was, in fact, John Preuß Mattsson's comment
about
https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_127_Malta/Docs/S3-261117.zip
from 3GPP TSG-SA3 earlier in this thread.
So, I retract my statement that "IEEE is asking TLS WG to 'please hurry
up'" -- instead, it should be that 3GPP SA3 from ETSI finds relying on
numbered internet-drafts insufficient in place of an RFC.
In particular, it's a concern regarding
https://www.ietf.org/archive/id/draft-barnes-tls-this-could-have-been-an-email-00.txt,
where I happen to agree with the introduction there:

 "There used to be a grand tradition of debating the merits of
   cryptographic algorithms in the TLS working group.  Over time, folks
   realized that this was not a productive use of the WG's time.  The
   typical TLS WG participant is not a cryptographer, and the
   cryptographic choices of TLS users are typically dictated by other
   factors than the opinion of the TLS WG."

and yet also -- alongside 3GPP SA3 -- disagree with the conclusion that
RFC's ought not be published. Publishing an RFC matters; it's only a real
output once an RFC is finalized. (Yes, I understand other points in this
thread that the current discussion is on Type XYZ of an RFC vs Type ABC of
an RFC.)

That said, if the goal here is in fact to say "We'll get to a
pure-mlkem actual-RFC in two years, or something," (matching the IEEE
802.11 timeline, let's say) then shouldn't that *explicit timeline* also be
present even in an Informational RFC (or whatever Type XYZ of RFC that
finalizes [I'm ignoring my personal wishes here])?


=====


Second/finally, Usama writes:

"The topic under discussion is IEEE 802.11 LS for pure ML-KEM in the TLS
protocol. I think we must distinguish between algorithm standardization
(NIST) and protocol integration (IETF). While there is support for ML-KEM
as an algorithm, I am not aware of any "international consensus" on its use
as a pure KEM within the TLS protocol. If I have missed something, please
point me to any such "international consensus"."

I appreciate your agreement that there is international consensus for
ML-KEM as an algorithm. However, I also believe that requiring me to
further claim international consensus for "pure ML-KEM" is, genuinely, a
false dichotomy.

In my own company's systems, I have situations where I'd prefer to use pure
ML-KEM, and I have situations where I'd like to use a mix of ECC and
ML-KEM. Primarily, the advantage of the latter is for bandwidth savings in
highly signals-constrained environments. Working in only ML-KEM, in live
systems, comes with a much higher engineering burden than non-cryptographic
network engineers are happy to tolerate. (I'm also starkly aware that ECC
may be "dead" from a product engineering point of view, no matter what we
discuss here -- in that it may take years to roll out new ECC-based
products, and the lifetime of such protections may be very short these
days.)

Let's be clear about where we are: We have a passed-vote for RFC on
hybrid-TLS. Recently, we have, approximately, a couple dozen votes to
advance pure ML-KEM as another option; and another couple dozen votes to
forbid pure ML-KEM as another option. This isn't about requiring everyone
to use pure ML-KEM; this is only about whether some substantial
approximate-half of the body politic is permitted to use pure ML-KEM in the
TLS protocol at all.

Moreover, as I hinted at above, it should be clear that -- eventually --
pure ML-KEM *will* be the only viable choice (sans some kind of longer-term
additional international consensus about a new PQ-KEM algorithm standard,
which seems very far from coming). So, it's not even a question --
currently -- of whether pure ML-KEM will or won't be standardized; it can
only be a question of *when* pure ML-KEM will be standardized for use in
TLS.

So the basic framing of this question *should* be: Are all products and
companies and implementations *required* to support only hybrid-mode TLS
now, and also *required* to perform a second large-scale engineering effort
to migrate to pure ML-KEM sometime later (whenever that happens; and bless
everyone for having the energy to restart the conversation in two years or
whenever); *OR*, is it acceptable for early-movers to adopt a purely
quantum-resistant solution now, and offer it (optionally) to connections
that accept that algorithm suite during TLS negotiation?


Kind regards,
--Daniel


On Mon, Apr 6, 2026 at 9:11 AM Muhammad Usama Sardar <
muhammad_usama.sardar@tu-dresden.de> wrote:

> [ sorry for the length ]
>
> TL;DR: Those who know me understand that whenever I make strong claims, I
> later provide an independently reproducible proof behind my pushback, e.g.,
> proof [0] for claims [1]. I am doing my research on this ML-KEM thingy and
> I will present substantial evidence in Vienna. So thanks for your patience.
> If that is too late, can someone please explain genuine urgency so that I
> can prioritize it? Also, as a counter-argument to my position, can someone
> kindly show me that pure ML-KEM is *more* secure than hybrid in the
> context of TLS protocol? Thank you.
>
> Hi Daniel and Uri,
>
> I appreciate you raising concerns on my position. To ensure full
> transparency within the WG, I believe it is necessary to highlight the real
> context behind the development of this LS. The technical presentation [2]
> in IEEE 802.11 meeting in March that led to this LS states:
>
> > The IETF is seeking statements of support from other SDOs regarding the
> use of pure ML-KEM and the applicability of draft-ietf-tls-mlkem.
>
> It is the IETF who requested it, not the other way around. It further
> states [2]:
>
> > During the most recent call [3], Paul Wouters (one of the Security Area
> directors) noted that it would be helpful if IEEE 802.11 could send a
> liaison statement to the IETF saying that IEEE 802.11bt is pursuing use of
> pure ML-KEM. Following that call, I received clarification that
> specifically, a statement of support for draft-ietf-tls-mlkem [1] as being
> useful to IEEE 802.11bt would do the trick. Such statements will help show
> consensus for publication during WGLC.
>
> (Note: [1] and [3] in this quote are from original source. They don't
> match my references.)
>
> Soliciting an LS to "do the trick" for showing consensus does not address
> the technical concerns of two dozen people who have opposed publication in
> the WGLC. Given that *there is no public evidence of IEEE 802.11bt having
> consensus on using pure ML-KEM in TLS protocol*, isn't it fair to ask for
> technical rationale?
>
>
> On 06.04.26 02:16, Daniel Apon wrote:
>
> I remember, and enjoyed, your talk slides about an abacus and a dog.
>
> Could someone please share a pointer to slides?
>
> Also, I suppose "the middle distance" is Google's 2029 deadline now.
>
> That seems a little off-topic. Google's 2029 deadline is an internal
> corporate roadmap and does not seem *technically* relevant to this LS or
> the IEEE 802.11bt project. IEEE 802.11bt project mentioned in the LS states
> [3]:
>
> As an example, the United States National Institute of Science and
> Technology (NIST) will disallow use of key establishment and digital
> signatures based on classic cryptography for use in US government systems
> after 2035.
>
> Motion TGbt-M-16 [4] that is approved at IEEE 802.11 and that resulted in
> this LS also has no such urgency as Google's 2029. As noted in [3], the
> relevant regulatory deadline (NIST) is 2035.
>
> Besides, I don't think it should really matter to Google whether IETF or
> IEEE is publishing it. If it does, please explain in full detail to me.
>
> In any case, Richard's argument upstream seems to hold here as well: That
> should be their (Google's) issue, not ours.
>
>
> Let me turn to a more important point (or, points) by Usama in this thread:
>
> I am humbled that you consider my point(s) as 'important'. Hopefully the
> following clarifications will be help clarify my position.
>
> "IMHO, unless some technical rationale is provided by IEEE 802.11, this LS
> should just be read as 'someone somewhere in the world would like to use
> pure ML-KEM' and TLS WG should not serve as a *printing press* for such
> requests."
>
> I would like to clarify that you are half-quoting me. In particular, the
> following points in the same paragraph were stating that we should give
> them 'no objection response' to publish it to put an end to whole of this
> debate. I have also provided a way forward in TLS WG. So I am neither
> blocking IEEE nor TLS WG. Please don't make it sound otherwise.
>
> I completely disagree with the characterization that  'someone somewhere
> in the world would like to use pure ML-KEM.' It's dismissive of the current
> situation.
> Not only has the international community, after more than a decade of
> work,  aligned on ML-KEM as the PQ-KEM standard, but IEEE (as a computer
> scientist, IEEE is not no one!) is requesting that the TLS WG "please stop
> delaying."
>
> I respect your opinion but in my reading, it just says we support
> publication. Motion TGbt-M-16 [4] does not state anything about "delay". So
> I sense no urgency in the LS. A publication within two years seems aligned
> with their timeline [5].
>
> Even further up the thread, Usama writes:
>
> "I was actually hoping to see some *technical rationale* for support of
> publication."
>
> May I please point you to
> https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf
> or
> https://csrc.nist.gov/Projects/post-quantum-cryptography/email-list
> for overwhelmingly sufficient technical rationale?
>
>
> If the international consensus on ML-KEM as the post-quantum KEM standard
> is insufficient, would you please explain further what you explicitly
> desire in terms of *technical rationale*?
>
> The topic under discussion is IEEE 802.11 LS for pure ML-KEM in the TLS
> protocol. I think we must distinguish between algorithm standardization
> (NIST) and protocol integration (IETF). While there is support for ML-KEM
> as an algorithm, I am not aware of any "international consensus" on its use
> as a pure KEM within the TLS protocol. If I have missed something, please
> point me to any such "international consensus".
>
> Besides, I have asked for their technical rationale for the support in the
> context of their project IEEE 802.11bt mentioned in LS.
>
> Best regards,
>
> -Usama
>
>
> [0] https://github.com/CCC-Attestation/formal-spec-id-crisis
>
> [1] https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/
>
> [2]
> https://mentor.ieee.org/802.11/dcn/26/11-26-0652-00-00bt-ietf-request-for-pure-ml-kem-liaison.pptx
> (Slide 2,3)
>
> [3] https://www.ieee802.org/11/Reports/tgbt_update.htm
>
> [4]
> https://mentor.ieee.org/802.11/dcn/26/11-26-0299-00bt-tgbt-agenda-2026-march-plenary.pptx
> (Slide 25)
>
> [5]
> https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx
>