[TLS] Re: [EXTERNAL] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3

Yaakov Stein <ystein@allot.com> Thu, 03 April 2025 12:29 UTC

Return-Path: <ystein@allot.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 6E11B16D5AEE for <tls@mail2.ietf.org>; Thu, 3 Apr 2025 05:29:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=allot.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hhKpm7esSHTG for <tls@mail2.ietf.org>; Thu, 3 Apr 2025 05:29:17 -0700 (PDT)
Received: from MRWPR03CU001.outbound.protection.outlook.com (mail-francesouthazon11021087.outbound.protection.outlook.com [40.107.130.87]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 5472716D5AE6 for <tls@ietf.org>; Thu, 3 Apr 2025 05:29:16 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=HvFBP+dLYPa31ejn6VPUmN7n5BkOCAB4WY6JUdMzNjZg46b4H8cq6y8cbiYvjlOrkFkvBf36fy2rZKWam/eMZtzDNfSvkXlnSfNyuBn0ciFLI3kgvbuUeRtQYR+whIAMJ+0EnGbLEkLiUXH7M6N8Z4W7f1VhT+ei+f8epsgn4nValx2wpnAXC506YbsKoOmrrDLRgCB0bITxnIqhVKerDxvYgE8gvtJrQylprlSTQ1S6MIosqzGg4FRLgidAMLMB8Qzl07NrMuomVSTdJZKCuur8ZydTGdWB+Iu/fQdhldqALksbnOOXxo6OlsDio0yqQ/5IEKXlVgjG3UYh9QALwQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pobG1CXPvJRGlfIQWufVg/pCsJCSuamBg7pezmdm9To=; b=F2XJU1i/UFrZmMI5hR6496tEzKphkXjVr0sna+n3dj3bcu5/KA7dBU9zzn1I4FpbtGMOnaU38mCNIS7g+O/hxx9ARQpEkL2csBBmlfzq6/NlB182Nh35Th9WDDwFHdPdc5TBhyhcgdjmHKm04vHNhR7GZJVfQYPmMaZs00VkuZi8+R+tFSCXYudh3awD5HS8l4k11aqqoam2IYQNjck7vKm6MqLVcrvYY8onW/gMQpvRgYSOJUYD0j1yb5iDTOPHUagHGg+AYcKwc+wGCV2gAQe1JtpjPFRWc2JC9AXFKA+Fk+UIff8ecKuBHUfF5v6YWdS3k+H2NWb2N5nCVfekWA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=allot.com; dmarc=pass action=none header.from=allot.com; dkim=pass header.d=allot.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=allot.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pobG1CXPvJRGlfIQWufVg/pCsJCSuamBg7pezmdm9To=; b=BAjcwPU3cbEgiIOX5Yg1l1zystSbBeAV2WbCzrONPL/VMAF3t8j58bUfuSEtSiwfw9qRTPCua7wquC5xLWl4rMUxZP95YG0mebw4h9cQsKhFaHQoUESDtVCjb+O2N2ptO7iHPa5gq7yN88xt3xeyr+O5GL0nLWgyFyWF4AhVh3I=
Received: from PA6PR08MB10707.eurprd08.prod.outlook.com (2603:10a6:102:3cb::5) by PAXPR08MB7381.eurprd08.prod.outlook.com (2603:10a6:102:22b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.52; Thu, 3 Apr 2025 12:29:12 +0000
Received: from PA6PR08MB10707.eurprd08.prod.outlook.com ([fe80::ff02:9799:b729:ae6a]) by PA6PR08MB10707.eurprd08.prod.outlook.com ([fe80::ff02:9799:b729:ae6a%3]) with mapi id 15.20.8534.043; Thu, 3 Apr 2025 12:29:11 +0000
From: Yaakov Stein <ystein@allot.com>
To: "Bellebaum, Thomas" <thomas.bellebaum@aisec.fraunhofer.de>, "jschauma=40netmeister.org@dmarc.ietf.org" <jschauma=40netmeister.org@dmarc.ietf.org>
Thread-Topic: [EXTERNAL] [TLS] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3
Thread-Index: AQHbo9b38eZrQAXbUE+yipi8PY9TWbOQj5kAgAFPcJA=
Date: Thu, 03 Apr 2025 12:29:11 +0000
Message-ID: <PA6PR08MB1070754B0D9A2EFD728B51DE2D3AE2@PA6PR08MB10707.eurprd08.prod.outlook.com>
References: <582917A1-F936-4A15-AE9D-342076605BE7@sn3rd.com> <Z-1AGna12NAYHPl9@netmeister.org> <6ff838df0794e75225d9e9ce9f53248c9bdf4235.camel@aisec.fraunhofer.de>
In-Reply-To: <6ff838df0794e75225d9e9ce9f53248c9bdf4235.camel@aisec.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-codetwoprocessed: true
x-codetwo-clientsignature-inserted: true
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=allot.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PA6PR08MB10707:EE_|PAXPR08MB7381:EE_
x-ms-office365-filtering-correlation-id: 3c953ca1-7f96-4ac0-8361-08dd72ab2357
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|366016|376014|1800799024|38070700018;
x-microsoft-antispam-message-info: o1Cy0SRniOu6/YawIALDsQEYEGsvOdbSMZH+72uXw+pTqRdy7YKXQw1hNw6wH/ooc2lKG3nqwyZJOeDYZRHUcrouYl2wkL2poV5rMaRSQfYy2WkB9dSZt3T6C6DE8eFhOitPT4CJZI9vbmleeu7gQHOzlvNjDZYVlMg2Z/qXgwiRAItaOgPOCZ2d3NMpLd/PewbRDI5q9j+pLdPUcMASTniNxa2/44pYv72YRA19MdzVOYx3cXa3AiCCoxSNrtgIN2Guy6O0JsoocGKE7m99/jCbtrLm2vJdbYRGAvBrcDkx6kpXKtv4bS4FVbVqJG6XAywmsRO5svxeW2oFh6qqxIwUUlr4Ty4ONueCXOdMMfyKuWut9HYHdNpYFa8SfYj5xeoO0ANLuJkk6Ko1xgfz8Bnd049cL6FzV+49D4bXfxurIE0r7y2A2YWzMUA96HAAS2VXyMrEZ/IN4+C3+FcafxUl7YOYs00KqHthV3It+r5WxmUgAx1LmulkPtK0qDuKVLkr6y9YINmd+CyaE6KBY3Y4/yQVVVqanDqW/KkXoJPh4wFmvv8c65P4WGWykT8xOTA/W4ZCPLePC3AA5qMnzFi5ZBAICmLip0CN6Jy87j/edY0Shb6tjr2G9HN4Dw3yXxhNO7oUb05/zA1srh9qC6nyFi402Zq9/3qFsg6KFjzkJOXKbmCrChFUM2etEtWzMrvLq0FAzcmzwKIYeTQa9M+dk/Y9fDjJ/uF8I2ctt2VJcDopv9vUoq/0lTUHE65u5Z6aqD4f7CnyTsbnF1vKGZI6wk2ReGjOFMwPKPusUxidJeQ/OEAC7D69vDQVf+biFNMwe1Qs+T7PqnGjYy2/P1SJe3HYnbQG8j7OodhNzRYM7KLszK1+GQQM97Df5lbHvIv8Wc1XPUeDCfp1KI+QuFbHPccKXcfI1QbsQZZIx9vN9PWsa6UCorWLML8BMeql/WTPuSuDucpZnsYUmiMFpROR5RFzTg82qm4138vdjORrqVvfSjEx64ZvyVZmTW8NdKqNsNYA6bWluhAREnykBHwnz8c3DMHKdBLTvEXG47qMfYcRBxkv/bFTXso8mpE0/E+QNtWSBwCsPvxGQSODTyW4GdbWtHbi2ZtH38vF/PpX13J6GQlciee5eVPIsLv7TuCgpLFTwZFwSKgaArL87DbRgblhoiP7ZaYJ5ynAujWySQJsX2Hkt9yRoVoXhS4iHPsDeYGejPRLQQLiBniCUo6L2MdrgHiUF6uuC1xU3fw3HNKlo4dY1Rf2bNyx/63C/tD6yUK/N6hlWBnktu6mIoUhH4du3ojMJ66QRJNgIbbOugXEZV4D9jUis4pua1zUs1XPV6zYhfpMbVMN/8DygqxYo8ZsmQ9BVkTPIByuAaS/By1kDbDRBFmZdy0Y1qj8FxWv+2qlnFCWwOGkIwdnD0J1ML/PgU07DIzieRIEh+xrXfmFoSshaiElXENQotGr
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PA6PR08MB10707.eurprd08.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(376014)(1800799024)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 7B1+MA5SREwyE2LXF4AIM9tFLB9pG6IYGdECsj+T8yi85CKHHeeHOK5Z/+OEq2PwJxK3HK/ZnhaU/gYusMFy9TWD/2AtpeYnGStqN8WuFWikcypwgYiLJlvkT1+IlRTB59FuphJPeWHhp8bPqna3mwJAH+UmsP7wH3aQjpruM/+ZC7SgL69+fTb706/uhZtA066KZllzRnspVGYsyLU2Pbo0bnkm1SAPa9wMfEXWlMdsGJUSVBVqUeV51C7aUi+vWaBxHjJbyJUvYNIWB6p8qfb+Q/RAhRlqVOSJgVe5zjHjiw9MzwQ+86ALz90Yd8qFXVrwEn+GzsYNRqXKo4fHWBhpfwW9zpJ0JqhgDcjFTGYTpc0kVYt7WN1QKwCLJhGHRmHvAcKBfJhFvSgTjl1iD0hYpvmbqnshjb8GURfqKgy2Z1YDZ2wcQOKTMj9GAKsj+e9xn1o+XOAz6kIXqiKh8HabmEr9T/rRPqXBtQIwgt58g1vcx5h6YTxARGVbqQjrpqC014N6Qk0N36J7XRmLvxrUVzkp69Z58RGm8FhWkZQbIWaNwWW58BZV1HBK5UHPcTntr0DD8V6bC5Jl2MY0Wd47kiLSY6+M07M/7ccg7FlWT5srF1QQP4UzHDfyPFEycvGtQlgPkE66/O++csKbvpMNpsozt3kR8tzvJj4bm9ws9k0MVlPnnahBWfBUJQa4PmoKPsXFgZcF50SBX3mZxELK2nLArVMwntctNTGT53WGyK+maO9+9zFxEAmx2UGA2UPwQSWQ1RnTepzefdSMItVe4LCvpKHf1XvRNwAT9rHbL6UPcvc070spFI9s43bYoEe3e2IN5+rY03vq76tPMSZ75Zh7y7LJc6XhHap2S2HxDEqtmBxdPGKxXfxC1guFOqBia1Ws9DBrQoc3K5h/62+OJGXYHeaFz3zxUR7MS3E9K8D4LyAkJh6/kITvb7rE6uwXKjXkLmV6U2dK8pY64YgxyXmROOCWPh5aM7Zrid0fHPYwD5u1mK5WJD2ae0YyXvWDgA+tprrlwfGg+2dS49DYaW2COIRVV69l0jeMb53oJXMjSzHtUW4STgap7MvXt2+sKTGafu2nF3WLHnkrpprJUE2EWFILSxEZplFN2g7YilDFZ/FULFqr0EviZ4K34NqI1BJzvmowmXNwHw6ZuJP8YWscT6ZWGOjtuWFoXQcPCOcqXjWiNJ38BIQUSVtbUTSBNkbslbNiwcmGkZq/HbrGZmI1s/bDZBBOkr923R4I5r6aLWp8s35tmXib27u53l0fpipkvMZlhxahOKn0ZTGsICrrMyPeCZ1pHa42DffEMRbusIgaYQ117G8Vs31fMouvCnrgSUaH+yuoc+QHBXeQGzlZaRjcPSF5EiYP+U9MRGiRUv2KUYOzz61PeWz4CKyP3bLPrQdZsXjYkMRfzQ/CpAZeARYIHI3VuSheWZsK2zpl0w4g8IFNZbmOGN1M5Qslc5xtKip5yg0oBqgyq10af++3wRD1QxIDZ81GYNf+7K9BL7NuII2i/KWHdXgK/gKCpZtFi/pYGeRmBxv60pGMBzmg+ikMJs51kpk6rmg=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: allot.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PA6PR08MB10707.eurprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c953ca1-7f96-4ac0-8361-08dd72ab2357
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Apr 2025 12:29:11.3962 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 789e5ff8-0396-414e-803b-13a424e9f5d2
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: h0b3JAG7Bl68H7kPougRFkoz3m1CQtbXiq8vh84yWbLrwfdsGj9o4EXvePc2Maf050Vak/fr+rGLNl1Dpnw4Cg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB7381
Message-ID-Hash: EGTV4ALSHM75AUZU53J3L5F7YQDEQQ3J
X-Message-ID-Hash: EGTV4ALSHM75AUZU53J3L5F7YQDEQQ3J
X-MailFrom: ystein@allot.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tls@ietf.org" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: [EXTERNAL] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/OvzBjUUUA5GltbKWOgVsgvx9_Gc>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

> Even with Recommended=N, I can imagine many managers reacting to a presentation on "YOU NEED TO USE PQC LIKE ML-KEM BECAUSE ELSE..." by googling "deploy ML-KEM now" and being recommended this rather than a safer hybrid[1]. I am not convinced that such a person, if given more knowledge, "doesn't want to do that".
> [1] After all, the manager was told to deploy MLKEM, not this suspicious X25519MLKEM, whatever scam that must surely be.


Really?

I asked ChatGPT "Should I use MLKEM alone or a hybrid ECC + PQC combination?" and received the following balanced reply:


The decision between using ML-KEM (Kyber) alone or a hybrid ECC + PQC combination depends on your specific security and performance requirements.

Considerations for Each Approach:

ML-KEM (Kyber) Alone
✅ Pros:

Post-quantum security: ML-KEM (Kyber) is designed to resist quantum attacks, unlike ECC.

Simpler implementation: Using just one algorithm reduces complexity.

More future-proof: ECC could become obsolete when quantum computers become practical.

❌ Cons:

Less tested in the real world: Though NIST has standardized Kyber, it's still relatively new compared to ECC.

Potential hidden vulnerabilities: Post-quantum cryptography (PQC) is evolving, and new attacks might emerge.



Hybrid ECC + PQC Combination
✅ Pros:

Strongest security option: If ML-KEM is broken, ECC still provides security (and vice versa).

Defense in depth: Combining a well-established (ECC) and a new (PQC) algorithm increases resilience.

Better interoperability: Many current systems still rely on ECC.

❌ Cons:

More computationally expensive: Hybrid approaches increase handshake size and latency.

Complexity in implementation: Managing two key exchanges means additional attack vectors if not handled properly.


Which Should You Choose?
If you need maximum security and don’t mind extra computational costs, go for hybrid ECC + ML-KEM.

If you prefer a simpler, efficient, and future-proof approach, ML-KEM alone is a strong choice.

If your system needs to work with existing ECC-based infrastructures while transitioning to PQC, hybrid makes sense.


💡 Current Best Practice: Many organizations (e.g., Cloudflare, AWS) are using hybrid modes during the transition to fully post-quantum cryptography. If you’re designing a system today, hybrid is the safer option for now.


Y(J)S


This message is intended only for the designated recipient(s). It may contain confidential or proprietary information. If you are not the designated recipient, you may not review, copy or distribute this message. If you have mistakenly received this message, please notify the sender by a reply e-mail and delete this message. Thank you.