[TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
Daniel Apon <dapon.crypto@gmail.com> Tue, 07 April 2026 01:26 UTC
Return-Path: <dapon.crypto@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id CE04BD7437B4 for <tls@mail2.ietf.org>; Mon, 6 Apr 2026 18:26:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775525213; bh=ZKmXKxx2++DzjZP1Xr7YvoV5xsDZi9VKw5kaAGWhcWs=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=nQM/S9wBpL3jns+QFzDPGz7PbMTxR9w88AkP7jULhC9w+IY139gRuOuYjXdLcNana 0GvYPIHsP7zqAmwiGPfmR00jep0mKMJ0CGybWdR1bjXfvMhEL6JDpDcufpVX7YI1Bd vlt4IXNnUK9+j6Kyjm1MrBt7S1pgtWDQCI8Gbl0k=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dltx-2EJV4S0 for <tls@mail2.ietf.org>; Mon, 6 Apr 2026 18:26:52 -0700 (PDT)
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [IPv6:2a00:1450:4864:20::135]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4801AD7437AD for <tls@ietf.org>; Mon, 6 Apr 2026 18:26:52 -0700 (PDT)
Received: by mail-lf1-x135.google.com with SMTP id 2adb3069b0e04-5a3af1b7549so3989767e87.1 for <tls@ietf.org>; Mon, 06 Apr 2026 18:26:52 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775525211; cv=none; d=google.com; s=arc-20240605; b=aQ/jqqZOPx4DpJ0rwDsYNwTeg0WW0NeWPZYD4dHsxXczJzIRjiJaDl7fnS857N/I4s nnOE7iPs5F9jCFp9i/y9qXGiL6TEB/wESNDg/5wLNKg+QUfgE0L9VFMDex0KAI16YxdF LB4tO3bKO1NVRBZT0eRc24YYVwjvvCYvTMXFiYlvUMpkEHi3Nn9mlJYI3FG/GsrNxSVV VPv6gqPinRB+zt7NBc4OelmyFgILsCy1y5RXVqhylg6N7oHo4qj9xpoorMpOA1VNmm+8 vhDTC+Sd/M1W0g6qphvPBEMBFDqjzl7zfXvwOTN5a90tBeMtVPo3cwbp65f9y2Ktc8E7 43cA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; fh=AgPIZtcZamt/v8BtHfNFPke5ZNYhfd++QLxrPUavzMI=; b=fUBlV0CA509WnfLdQCRNjh38TzFrSIOTO8+38pYvLm5D5Z0KkdWN1VUH4BsZNDh1dZ y8wp2eoLnULSxpuK+phw/m33WNgS8Yl0dN730HFplW6cmrqCt50hljXObuSKTOQDlRlx k344bS+yfZL4Lvj1RBBfwidk01S+OMcwUbiZzd7rxdFrIkEYySu8T9V4G6UIJcdSDqX4 aF3XCk5zL2cjMGJhApIn7T1oHUCyDKbC0g9FLMSqJSeYVHaYv8bBIOa/noUFz/e42Ukh /yyGyc/z/Zku+QYWyBhc3JYsXeagsC3mgS4i3246Cv54CX86m1tqjOvUTi4W+EgYt6XT 2F1w==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775525211; x=1776130011; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; b=hEoK12ci9Ipih4dkYuI2xIf7+9UwAk3Py/xy/aaJdJ0Ljyt9hGrXAhamQ+THKkjyfP wSeQa42ZGagVZ/vMcmxMUExKqUD0L+XoPgSC/F94qxUYTDpcKqKJ1iuGCO3+lalMfg9q HE/83F3Y80p5SjQFyY4+XrvvqiZQfS45NFVR3tToi8BkoD1CGbCrAuFtncTWIuA2IKJv aRR6zAlT4Dj1jMap3WlyOPik2d7x1whkDRDccXNIT8YQAI0dabSsWBuwjpe7RdjgugHm DDfuwwPg4/eIQKHKTL8Ij+ez59P5deaICsHt3+f9Hs50dQCoOzFkC53RHaKWY1iX4UYq 6p9w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775525211; x=1776130011; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=inpgO/xOgLZIpKqiBN1CcRIdbzb/prCP9pK0p1Y/u2k=; b=QZG6vWtNw8WdvaWWOEeWs5UQT8hlT//I9z9QyGX+p/JL+s1Xi+Bw6d4ExCW4Y5nvi/ XktAQHJRpNy0GexOtMI2tpIMZSXdJsfG6NPnhgrozNA+yQYAC0DwL5582BpfYsSLKt3H 58AsXvTJxgv0kIWqsa3pOgD1awhdcNw69vAdDnuTu5yOXdKT0GQHEGy3gc4LipWc2ACE jPQzfgwVPwfhD9v/nu5uRCh3fVh6wivIrvhrArk8V30H261ARPOkfOpnrRht012jcWNx mJWYCfyxaSg9jIg43amNs4E2Y96WxD/iW7dDolzerTNPQAhIQ0mSHJmejPFhFzKFhdCO VPnw==
X-Forwarded-Encrypted: i=1; AJvYcCVs27eaOO4FMQQu9X7bJU84ynFgmK79rnJjs7tRvkuK0dazLgxWcKAfbqHnxAnSon7J/Mg=@ietf.org
X-Gm-Message-State: AOJu0YxdVGp32o5bBxxoMCJWgfP4Yj8j66gs6RGeuIPj/KV8sU9oDtx0 HnSFopTF4Ed1pUt7yEOaivoKflnfSigWDgH0gx/rbqnzgj8G2dUlqcNRA58OTRL9vtc7vGc6LGz P7bEMw0MegXZ9eW87+QvVeQT6Elynzr8=
X-Gm-Gg: AeBDievWqxXa43QI55bTrY/q7nAkkqxzvXmqvVc9zZOPAXdudxdM3C3YDGQcCh/Qlhw eVfW8fB5av+oRCWyhEnY5+8vkKsiJ68larIg0IKw3cwMyndhH4T9csNwdA+ttlEYzlqpVHGI1Mx jcjJ1BEfFSAq9QucGxAOpobSh46Gu1al82V7QFEFlvMJngZfbDkVZL234hbZZzR3qJr3VtBttDO 6wWQPdIVxIfoSZRHuQR0vaQjpjBuTEErGO2pyikS2hwjU6+XGf41pmj3kccZdWgWGfy6k3uHO/g jvZXSMQU/5PkxVt3ONDSzt2Ai9PT67waM2Zv1xCnV/Y9Q9IXHA3Hn8pKytcdNPg13FVHWqbt4Wc MdXvdNpkImF9TZdYNYgx0CBkWK0hc8VOPt7Z5f2qcyWUA/XbHBY2dHPlxvp2mRWBX3OIs
X-Received: by 2002:a05:6512:3096:b0:5a2:c6f2:c217 with SMTP id 2adb3069b0e04-5a337558230mr4661917e87.14.1775525210481; Mon, 06 Apr 2026 18:26:50 -0700 (PDT)
MIME-Version: 1.0
References: <CAF8qwaBcotZqOnY2qJ6d0fRoa=5v0sZTOSWqeqkou+bLJcy9LA@mail.gmail.com> <CABcZeBPr+WeivTWpSCVC4f95fRuSiOytvvBPB_6r+af9Didhgw@mail.gmail.com> <CEB84168-5998-432A-9D62-36E28B9CDFA5@vigilsec.com> <CABcZeBM-eoqh+kJ7H6SiwC9p4tKAt+YiQhzetJZJmPNpXc+5OA@mail.gmail.com> <CAF8qwaALDXR6d=jLD46wXmKHDjyj=OdJ1X3a1AgxF+ByQceeMg@mail.gmail.com> <697d6134-0083-4933-8531-9be49118be7d@cs.tcd.ie> <adCCIZsvHqgci5LT@chardros.imrryr.org> <597455e4-29e1-46a0-a9a7-b87c5adbaec7@cs.tcd.ie> <adFBMGhVMOl2eptE@chardros.imrryr.org> <34c6c882-4cef-4350-9afa-0edb0b460eb6@cs.tcd.ie> <adHR1YEW-mPEb_BT@chardros.imrryr.org> <MEAPR01MB36540326A63FD5EAB70F652BEE5CA@MEAPR01MB3654.ausprd01.prod.outlook.com> <CAPxHsS+fv2S_Ydub24AHnFJUESxkr=h1me5NEtdsZ4bCqAip-Q@mail.gmail.com> <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de>
In-Reply-To: <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de>
From: Daniel Apon <dapon.crypto@gmail.com>
Date: Mon, 06 Apr 2026 21:26:37 -0400
X-Gm-Features: AQROBzAUBCXVoxNaWbcu9x-35csyYjUwLqxnf0I_Pj93EDgvruDZoaI4wE5PAhw
Message-ID: <CAPxHsSLdspKfUsnewD03ez0x-bN-DXFY_zu=yuzzkTq9M=i1Ew@mail.gmail.com>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Content-Type: multipart/alternative; boundary="00000000000075e817064ed4adcf"
Message-ID-Hash: WSGIPDGJOXEEAB4JUY3WQHJXKY5JSNG5
X-Message-ID-Hash: WSGIPDGJOXEEAB4JUY3WQHJXKY5JSNG5
X-MailFrom: dapon.crypto@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tls@ietf.org" <tls@ietf.org>, Peter Gutmann <pgut001=40cs.auckland.ac.nz@dmarc.ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/2I6XpxSk0rwBixmKg3gMAc68TRc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Responding to Usama's message (which Usama quoted to Uri, in response to Uri's question about whether Usama had answered my (Daniel's) question): First, thank you Usama for pointing me to the proper text off-list, so that I didn't mis-quote the context! Let me try to go through this point by point [[Standard apologies for length]]: "On 06.04.26 02:16, Daniel Apon wrote: I remember, and enjoyed, your talk slides about an abacus and a dog. [Usama wrote:] Could someone please share a pointer to slides?" Sure! I'm not sure if there are multiple versions, but here is one I found (now) from Peter Gutmann's academic website: https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf The relevant material is also encapsulated in an ePrint PDF (with status "Preprint") at: https://eprint.iacr.org/2025/1237.pdf Going through the details of that presentation is mostly off-topic, other than I'd like to point out (since Uri asked Usama "whose expert opinion, beside Dr. Bernstein's, are you willing to accept?") that apparently Dr. Bernstein and I agree on at least one significant point here. See https://en.wikipedia.org/wiki/Scientific_wager with: "In 2023, John Preuß Mattsson bet $2,050 that [RSA-2048] will withstand quantum computing until at least 2050. Daniel J. Bernstein, John Sahhar, Daniel Apon, and Michele Mosca accepted the bet.[cf. https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/dezGXaKNNlU ]" What fun. :) Back to the thread: ===== "On 06.04.26 02:16, Daniel Apon wrote: Also, I suppose "the middle distance" is Google's 2029 deadline now. [Usama wrote:] That seems a little off-topic. Google's 2029 deadline is an internal corporate roadmap and does not seem technically relevant to this LS or the IEEE 802.11bt project." It is fairly significant in the real world, and therefore, I believe, on-topic: Google's adoption of this or that cryptographic technology influences an immense & overwhelming amount of Internet traffic. Indeed, when Google swapped to ECC by default in 2013, it constituted something like 80%+ of the global adoption of ECC as a cryptographic technology (over, previously, RSA). ===== Continuing, Usama writes: "IEEE 802.11bt project mentioned in the LS states As an example, the United States National Institute of Science and Technology (NIST) will disallow use of key establishment and digital signatures based on classic cryptography for use in US government systems after 2035. Motion TGbt-M-16 [4] that is approved at IEEE 802.11 and that resulted in this LS also has no such urgency as Google's 2029. As noted in [ https://www.ieee802.org/11/Reports/tgbt_update.htm ], the relevant regulatory deadline (NIST) is 2035." Well, first, NIST's instruction was written before the recent advances by Google Research. Moreover, the deadline that NIST is stating (cf. original source https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf from *November 2024*) should be viewed in context as the final deadline for the final adopters. It certainly is not the expected timeline for most adopters, and surely NIST may want to review that timeline and revise it based on new information (now 18 months later) at their discretion. The slowest adopters in the world will be the least-cryptographically-relevant U.S. Federal bureau -- someone like the USDA Forest Service, who is responsible for managing 193 acres of national forests, with little attention (or need for attention) to cybersecurity in their remit. (My sincere apologies to all of the honorable and faithful Forest Service employees who read this thread; I really didn't mean to pick on you.) So, my basic point remains: If Google is transitioning to PQC with a deadline of 2029, then that will constitute a Very Large Fraction of the world's communications, particularly over TLS. It makes it a reasonable timeline to frame the discussion. ===== More to the essence of my reply, there are two points I'd like to make. First, Usama writes: " I sense no urgency in the LS. A publication within two years seems aligned with their timeline [ https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx ]." Indeed, it seems that IEEE 802.11 has set approximately two years for their closing (as of their November 2025 document here). It seems what I was referencing was, in fact, John Preuß Mattsson's comment about https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_127_Malta/Docs/S3-261117.zip from 3GPP TSG-SA3 earlier in this thread. So, I retract my statement that "IEEE is asking TLS WG to 'please hurry up'" -- instead, it should be that 3GPP SA3 from ETSI finds relying on numbered internet-drafts insufficient in place of an RFC. In particular, it's a concern regarding https://www.ietf.org/archive/id/draft-barnes-tls-this-could-have-been-an-email-00.txt, where I happen to agree with the introduction there: "There used to be a grand tradition of debating the merits of cryptographic algorithms in the TLS working group. Over time, folks realized that this was not a productive use of the WG's time. The typical TLS WG participant is not a cryptographer, and the cryptographic choices of TLS users are typically dictated by other factors than the opinion of the TLS WG." and yet also -- alongside 3GPP SA3 -- disagree with the conclusion that RFC's ought not be published. Publishing an RFC matters; it's only a real output once an RFC is finalized. (Yes, I understand other points in this thread that the current discussion is on Type XYZ of an RFC vs Type ABC of an RFC.) That said, if the goal here is in fact to say "We'll get to a pure-mlkem actual-RFC in two years, or something," (matching the IEEE 802.11 timeline, let's say) then shouldn't that *explicit timeline* also be present even in an Informational RFC (or whatever Type XYZ of RFC that finalizes [I'm ignoring my personal wishes here])? ===== Second/finally, Usama writes: "The topic under discussion is IEEE 802.11 LS for pure ML-KEM in the TLS protocol. I think we must distinguish between algorithm standardization (NIST) and protocol integration (IETF). While there is support for ML-KEM as an algorithm, I am not aware of any "international consensus" on its use as a pure KEM within the TLS protocol. If I have missed something, please point me to any such "international consensus"." I appreciate your agreement that there is international consensus for ML-KEM as an algorithm. However, I also believe that requiring me to further claim international consensus for "pure ML-KEM" is, genuinely, a false dichotomy. In my own company's systems, I have situations where I'd prefer to use pure ML-KEM, and I have situations where I'd like to use a mix of ECC and ML-KEM. Primarily, the advantage of the latter is for bandwidth savings in highly signals-constrained environments. Working in only ML-KEM, in live systems, comes with a much higher engineering burden than non-cryptographic network engineers are happy to tolerate. (I'm also starkly aware that ECC may be "dead" from a product engineering point of view, no matter what we discuss here -- in that it may take years to roll out new ECC-based products, and the lifetime of such protections may be very short these days.) Let's be clear about where we are: We have a passed-vote for RFC on hybrid-TLS. Recently, we have, approximately, a couple dozen votes to advance pure ML-KEM as another option; and another couple dozen votes to forbid pure ML-KEM as another option. This isn't about requiring everyone to use pure ML-KEM; this is only about whether some substantial approximate-half of the body politic is permitted to use pure ML-KEM in the TLS protocol at all. Moreover, as I hinted at above, it should be clear that -- eventually -- pure ML-KEM *will* be the only viable choice (sans some kind of longer-term additional international consensus about a new PQ-KEM algorithm standard, which seems very far from coming). So, it's not even a question -- currently -- of whether pure ML-KEM will or won't be standardized; it can only be a question of *when* pure ML-KEM will be standardized for use in TLS. So the basic framing of this question *should* be: Are all products and companies and implementations *required* to support only hybrid-mode TLS now, and also *required* to perform a second large-scale engineering effort to migrate to pure ML-KEM sometime later (whenever that happens; and bless everyone for having the energy to restart the conversation in two years or whenever); *OR*, is it acceptable for early-movers to adopt a purely quantum-resistant solution now, and offer it (optionally) to connections that accept that algorithm suite during TLS negotiation? Kind regards, --Daniel On Mon, Apr 6, 2026 at 9:11 AM Muhammad Usama Sardar < muhammad_usama.sardar@tu-dresden.de> wrote: > [ sorry for the length ] > > TL;DR: Those who know me understand that whenever I make strong claims, I > later provide an independently reproducible proof behind my pushback, e.g., > proof [0] for claims [1]. I am doing my research on this ML-KEM thingy and > I will present substantial evidence in Vienna. So thanks for your patience. > If that is too late, can someone please explain genuine urgency so that I > can prioritize it? Also, as a counter-argument to my position, can someone > kindly show me that pure ML-KEM is *more* secure than hybrid in the > context of TLS protocol? Thank you. > > Hi Daniel and Uri, > > I appreciate you raising concerns on my position. To ensure full > transparency within the WG, I believe it is necessary to highlight the real > context behind the development of this LS. The technical presentation [2] > in IEEE 802.11 meeting in March that led to this LS states: > > > The IETF is seeking statements of support from other SDOs regarding the > use of pure ML-KEM and the applicability of draft-ietf-tls-mlkem. > > It is the IETF who requested it, not the other way around. It further > states [2]: > > > During the most recent call [3], Paul Wouters (one of the Security Area > directors) noted that it would be helpful if IEEE 802.11 could send a > liaison statement to the IETF saying that IEEE 802.11bt is pursuing use of > pure ML-KEM. Following that call, I received clarification that > specifically, a statement of support for draft-ietf-tls-mlkem [1] as being > useful to IEEE 802.11bt would do the trick. Such statements will help show > consensus for publication during WGLC. > > (Note: [1] and [3] in this quote are from original source. They don't > match my references.) > > Soliciting an LS to "do the trick" for showing consensus does not address > the technical concerns of two dozen people who have opposed publication in > the WGLC. Given that *there is no public evidence of IEEE 802.11bt having > consensus on using pure ML-KEM in TLS protocol*, isn't it fair to ask for > technical rationale? > > > On 06.04.26 02:16, Daniel Apon wrote: > > I remember, and enjoyed, your talk slides about an abacus and a dog. > > Could someone please share a pointer to slides? > > Also, I suppose "the middle distance" is Google's 2029 deadline now. > > That seems a little off-topic. Google's 2029 deadline is an internal > corporate roadmap and does not seem *technically* relevant to this LS or > the IEEE 802.11bt project. IEEE 802.11bt project mentioned in the LS states > [3]: > > As an example, the United States National Institute of Science and > Technology (NIST) will disallow use of key establishment and digital > signatures based on classic cryptography for use in US government systems > after 2035. > > Motion TGbt-M-16 [4] that is approved at IEEE 802.11 and that resulted in > this LS also has no such urgency as Google's 2029. As noted in [3], the > relevant regulatory deadline (NIST) is 2035. > > Besides, I don't think it should really matter to Google whether IETF or > IEEE is publishing it. If it does, please explain in full detail to me. > > In any case, Richard's argument upstream seems to hold here as well: That > should be their (Google's) issue, not ours. > > > Let me turn to a more important point (or, points) by Usama in this thread: > > I am humbled that you consider my point(s) as 'important'. Hopefully the > following clarifications will be help clarify my position. > > "IMHO, unless some technical rationale is provided by IEEE 802.11, this LS > should just be read as 'someone somewhere in the world would like to use > pure ML-KEM' and TLS WG should not serve as a *printing press* for such > requests." > > I would like to clarify that you are half-quoting me. In particular, the > following points in the same paragraph were stating that we should give > them 'no objection response' to publish it to put an end to whole of this > debate. I have also provided a way forward in TLS WG. So I am neither > blocking IEEE nor TLS WG. Please don't make it sound otherwise. > > I completely disagree with the characterization that 'someone somewhere > in the world would like to use pure ML-KEM.' It's dismissive of the current > situation. > Not only has the international community, after more than a decade of > work, aligned on ML-KEM as the PQ-KEM standard, but IEEE (as a computer > scientist, IEEE is not no one!) is requesting that the TLS WG "please stop > delaying." > > I respect your opinion but in my reading, it just says we support > publication. Motion TGbt-M-16 [4] does not state anything about "delay". So > I sense no urgency in the LS. A publication within two years seems aligned > with their timeline [5]. > > Even further up the thread, Usama writes: > > "I was actually hoping to see some *technical rationale* for support of > publication." > > May I please point you to > https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf > or > https://csrc.nist.gov/Projects/post-quantum-cryptography/email-list > for overwhelmingly sufficient technical rationale? > > > If the international consensus on ML-KEM as the post-quantum KEM standard > is insufficient, would you please explain further what you explicitly > desire in terms of *technical rationale*? > > The topic under discussion is IEEE 802.11 LS for pure ML-KEM in the TLS > protocol. I think we must distinguish between algorithm standardization > (NIST) and protocol integration (IETF). While there is support for ML-KEM > as an algorithm, I am not aware of any "international consensus" on its use > as a pure KEM within the TLS protocol. If I have missed something, please > point me to any such "international consensus". > > Besides, I have asked for their technical rationale for the support in the > context of their project IEEE 802.11bt mentioned in LS. > > Best regards, > > -Usama > > > [0] https://github.com/CCC-Attestation/formal-spec-id-crisis > > [1] https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/ > > [2] > https://mentor.ieee.org/802.11/dcn/26/11-26-0652-00-00bt-ietf-request-for-pure-ml-kem-liaison.pptx > (Slide 2,3) > > [3] https://www.ieee802.org/11/Reports/tgbt_update.htm > > [4] > https://mentor.ieee.org/802.11/dcn/26/11-26-0299-00bt-tgbt-agenda-2026-march-plenary.pptx > (Slide 25) > > [5] > https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx >
- [TLS] New Liaison Statement, "Liaison communicati… Liaison Statement Management Tool
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Richard Barnes
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Richard Barnes
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… David Benjamin
- [TLS] Publish ML-KEM after all (Re: Re: New Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Rob Sayre
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Deirdre Connolly
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Peter Gutmann
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Deirdre Connolly
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Arnaud Taddei
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Tim Hollebeek
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Nico Williams
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Daniel Apon
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: [EXT] Re: New Liaison Statement, "Liais… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: New Liaison Statement, "Liaison communi… S Moonesamy
- [TLS] Re: New Liaison Statement, "Liaison communi… S Moonesamy
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Christian Huitema
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Russ Housley
- [TLS] Re: New Liaison Statement, "Liaison communi… John Mattsson
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Paul Wouters
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Rob Sayre
- [TLS] Re: New Liaison Statement, "Liaison communi… Watson Ladd
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar
- [TLS] Re: New Liaison Statement, "Liaison communi… Daniel Apon
- [TLS] Re: New Liaison Statement, "Liaison communi… Eric Rescorla
- [TLS] Re: New Liaison Statement, "Liaison communi… Bas Westerbaan
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Viktor Dukhovni
- [TLS] Re: New Liaison Statement, "Liaison communi… Nico Williams
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Stephen Farrell
- [TLS] Re: New Liaison Statement, "Liaison communi… Salz, Rich
- [TLS] Re: New Liaison Statement, "Liaison communi… Muhammad Usama Sardar