[TLS] Re: [EXT] What about AuthKEM? / Online-Offline signature split

"Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu> Tue, 07 April 2026 18:32 UTC

Return-Path: <prvs=055795f1ae=uri@ll.mit.edu>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7C3A6D7A1A34; Tue, 7 Apr 2026 11:32:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775586736; bh=szI3Z1xCe51PngIllogE3CImfzW463XHoPk08ARayzw=; h=From:To:Subject:Date:References:In-Reply-To; b=ZEC4hpoB7qEW+9re0dFzCoDAmHTd8k5bnFzRcWwV1GjKwQVCuUPMClQbdb5jUpwle EEOfD2KweEEa2edOefnE319gQprTUChaOe1ET87wX/WuUSJ431ML/uUde28hn9HD1q VNY30yndpXABiQO/JkrqjGlXsDPpAmVy+Yn7b1Tg=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.297
X-Spam-Level:
X-Spam-Status: No, score=-4.297 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ll.mit.edu
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uw08hJLlYwN6; Tue, 7 Apr 2026 11:32:15 -0700 (PDT)
Received: from MX2.LL.MIT.EDU (mx2.ll.mit.edu [129.55.12.51]) by mail2.ietf.org (Postfix) with ESMTP id A3B4CD7A1A24; Tue, 7 Apr 2026 11:32:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ll.mit.edu; h= content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=dkim1; bh=PdfDn36G0H7h42u0c7yDR7+CnERw MK2LFPlYu0rJkmA=; b=i09h1swnMYaAgTJ3JLbpOeZvApqbOeSFHBNH9/93a7C7 mT0VDa8fNeF+C1cMhYPZlgLZZ8jeZZNRmqp3Ilf6JgZO4IdawIWqS+Se/osvxvJC LPXrhON6d48p3rPEDlXLbZx8oXtHbGBToLYHoyhVpJ+xPBZNVwmLDEo9jMb5UZFm 5Hct7Y3gDBc1M3TGRv2daVrZRcOI2a88m1J6ekY08JwGUfb80VauU+SYoPw2nw6x YhJx7Nbi7Rsm/SUIehVGglpYRY6nmsyaU5opEe63xsq2hOBUgWpssfez9qxvI08/ XClcq37hOn9Fd0CVuWV7Q3HPHDfJjljf96x3iM4YKg==
Received: from LLEX2019-02.mitll.ad.local (llex2019-02.llan.ll.mit.edu [172.25.4.98]) by MX2.LL.MIT.EDU (8.18.1.7/8.18.1.7) with ESMTPS id 637IWEdp047742 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 7 Apr 2026 14:32:14 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=n7iPrY/xnlk+fhhV/B7danndszXN0ipfLDmON9Qxw5briE6aRLdvKYAgXdLK+52WVNmXXNg+bIPRl2t6+8orIqTBowx0CCwFvLYb7KgeLK7JXD7vJISSlNXIL6z0mib0fXQWIvJRHwPUt41O1QauX3+/viy1ryJrWRtiuP8fuiWFaM03e8LSkF7PS4xIafV6IOzT9nElR6Z95/+INkbEkOhH9/OBtmON+w90YoXd6nKfEBTFBkDh6AWfEQRplDDB0FMBOTo961Uw7uFdNgIQpGXZTVyG1y9kc/HDDUO38GyVQAzrsMdEKdbeW44IhKUG8EvAwg5sLBKdVAXfNicVWw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0k0xXn+H2Nq+YOF6Vq5XsQzmfbAdRrwlIKmVY6zDaiQ=; b=JYwA9HKq/34o651rxPWcycI7EehiihaCP/V0DDS0oVqbhuqvECRAGu6iWngxA6JYrL0UKQplWezg0QpyB2e28iLpyiqbf8c9Sc5K/gPs4IRwMcnxGX+NgYffFj+OTHKGEy1LzRgvUysN6rigNYYUO5FkkoWx0jwnliSl0jw1Gtr4wnLtw5Eicw97oQSQk3xkuGH026tVF/t/cKsy0aP3I1PNU4ASE6/72QEWRWL1iQZ29w+h/jt550jNah5tvAikg1lJRkR/CtFonWnnoqayGp+A2ahiN93XFApG2PKAbOkKgDIViZtnqVE4gapriy93INEM+nv24eruf0koNv4E9w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ll.mit.edu; dmarc=pass action=none header.from=ll.mit.edu; dkim=pass header.d=ll.mit.edu; arc=none
From: "Blumenthal, Uri - 0553 - MITLL" <uri@ll.mit.edu>
To: Joshua <joshua=40marionberry.net@dmarc.ietf.org>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [EXT] [TLS] What about AuthKEM? / Online-Offline signature split
Thread-Index: AQHcwvBI5SJXEZToZ0WCGiEDPfaH0bXT8nHn
Date: Tue, 07 Apr 2026 18:31:59 +0000
Message-ID: <BN0P110MB1419E57C0C54357F0A8DBCAE905AA@BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM>
References: <MgNiohcykfGTjVuD5YkbKNofLPqoyyHJ31KztG3nKi06534S8J_yg4FIkYjlyRiGoCHMMn5UohbTMnjSULxnKRDCDaZEwelhtW0jAwRjy-U=@marionberry.net>
In-Reply-To: <MgNiohcykfGTjVuD5YkbKNofLPqoyyHJ31KztG3nKi06534S8J_yg4FIkYjlyRiGoCHMMn5UohbTMnjSULxnKRDCDaZEwelhtW0jAwRjy-U=@marionberry.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-reactions: allow
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN0P110MB1419:EE_|SA1P110MB2107:EE_
x-ms-office365-filtering-correlation-id: 3d75a4c1-9f23-4a12-10f1-08de94d3fc75
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;ARA:13230040|366016|6049299003|1800799024|38070700021|13003099007|4013099003|4053099003|18002099003|56012099003|22082099003|8096899003;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(366016)(6049299003)(1800799024)(38070700021)(13003099007)(4013099003)(4053099003)(18002099003)(56012099003)(22082099003)(8096899003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha256"; boundary="_02C8E0F4-E20A-4F4D-90DE-2222579123D0_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d75a4c1-9f23-4a12-10f1-08de94d3fc75
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Apr 2026 18:32:12.7261 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 83d1efe3-698e-4819-911b-0a8fbe79d01c
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1P110MB2107
X-Proofpoint-GUID: GkM4x2HLTFiArwWYQEfnmUAAL08z_D90
X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwNDA3MDE2NyBTYWx0ZWRfX7eQ5SdArjzuT yOnZ107QCZl01hwNIjennm0K+MXFzrZtMuPLBzct80HC+MtDB/WE1hDDelDA7ISLYXUJVIFPfuW 0sIbOHMaCQNBOm8E5domLbsB3Tdc2i5oqsO/llR410/w/8ljOlLFk5RT2TyKeRt5tl9lCmyMqPQ 2/f8UsCQ5em2j3sphX5QuWjoYSCaP6U9Ycc9eep15Se+eOWgzXU+yT/T+lUPgYNxhPl3oDf446Z VSnzmSbpYHMv/1+RWALIWHmurJaPcqTWgfFe9deShhRw0/cv+sBQsa8XqteCB2R2VHa5cd0Hw+d xWXAm/n81gX+6wv6FjN
X-Proofpoint-ORIG-GUID: GkM4x2HLTFiArwWYQEfnmUAAL08z_D90
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-04-07_04,2026-04-07_05,2025-10-01_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 bulkscore=0 suspectscore=0 mlxscore=0 phishscore=0 spamscore=0 lowpriorityscore=0 adultscore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2604010000 definitions=main-2604070167
Message-ID-Hash: 7VCLFFMUFCE2433FABSD7C6LUYMXAK4K
X-Message-ID-Hash: 7VCLFFMUFCE2433FABSD7C6LUYMXAK4K
X-MailFrom: prvs=055795f1ae=uri@ll.mit.edu
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: [EXT] What about AuthKEM? / Online-Offline signature split
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/QvpWfnkP2W8XoiPbTmQsDz4nE8Q>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

There’s a similar protocol submission at IPSECME, and I did some quantitative analysis, which I’ll post there later. Here’s its TL;DR:


This analysis quantifies the performance, bandwidth, memory, and round-trip trade-offs between two approaches to post-quantum mutual authentication in IKEv2:

* Traditional (Explicit): Ephemeral KEM + digital signatures (current IETF trajectory, RFC 9370 + RFC 8784 extensions)
* Proposed (Implicit): Dual KEM authentication (draft-wang-ipsecme-kem-auth-ikev2-03, MQV/HMQV family)
Two variants of the implicit approach are analyzed:

* Proposed-A: ML-KEM-768 for both ephemeral and authentication KEM
* Proposed-B: ML-KEM-768 ephemeral + Classic McEliece (preloaded keys) for authentication
Bottom line: the proposed approach cuts per-peer CPU time by 85–95%, reduces wire bytes by 50–78%, and — with preloaded keys — reduces message count from 4 to 3. It does this without weakening security; the protocol security rests on HMQV-style proofs and dual-KEM assumptions.
You get similar advantages with ML-KEM-1024 and ML-DSA-87.


--
V/R,
Uri

There are two ways to design a system. One is to make it so simple there are obviously no deficiencies.
The other is to make it so complex there are no obvious deficiencies.
C. A. R. Hoare


From: Joshua <joshua=40marionberry.net@dmarc.ietf.org>
Date: Thursday, April 2, 2026 at 18:30
To: tls@ietf.org <tls@ietf.org>
Subject: [EXT] [TLS] What about AuthKEM? / Online-Offline signature split


While the horticulturalists over at PLANTS has been working on some really cool stuff regarding tree signatures,
I wanted to revive an idea that’s been toyed with in the past: what if we move away from signature suites for
handshaking, and move to exclusively AuthKEM-based handshakes?

AuthKEM has some advantages over “normal” Signatures. Chiefly, we are using signature algorithms designed to be
provable to anyone, anywhere, and using them in cases where only one person will ever need to verify them. This
has real impacts on the attack surface; non-constant-time signature generation can lead to key recovery attacks,
implementation errors can lead to key recovery attacks, implementations can potentially be tricked into signing
maliciously crafted plaintexts, etc. On the contrary, AuthKEM "proofs" are very localized; an AuthKEM "signature"
can't easily be passed on and verified by third parties.

Overall, 3DH-esque authentication schemes are simpler, faster, and smaller than their comparative signature-based
authentication schemes. (Kyber512 is used to illustrate, but I do not recommend it's adoption)
- Dilithium2 requires 3,700 bytes to communicate a pk/sig pair, whereas AuthKEM-Kyber512 requires less than half
at 1,500 bytes;
- Dilithium2 requires about 300kilocycles to generate a proof, whereas decapsulating a AuthKEM-Kyber512 secret
can go as low as ~30kilocycles;
- Dilithium2 requires both a correct constant-time PQ KEM and a correct constant-time PQ signature algorithm,
whereas AuthKEM-Kyber requires only a correct constant-time PQ KEM.

For example, consider the issues with Ed25519, generally considered one of the more bulletproof signature schemes
available/widely deployed today:
- Despite having constant-time point addition, a constant-time scalarmult ladder is required to avoid side-channels;
- A single bit-flip during signing exposes the private key immediately, and implementation errors compound this problem;
- This also occurs when signing with a mismatched private/public keypair (which some implementations used to allow)

These benefits* have, of course, already been enumerated in the AuthKEM I-D, available here:
https://datatracker.ietf.org/doc/draft-celi-wiggers-tls-authkem/ <8d3ef7ce-3599-4055-a346-31b9817c1f6a>

* Debatably “benefits” based on your use case, hence why I’m writing this email.

That's not to say that lattice-based signature schemes are a bad idea; on the contrary, I think saying "we should
only use AuthKEM for authentication" frees us to consider more optimal signature schemes for each step in the chain.
For example, FN-DSA is a perfect fit for chain signatures (especially since we don't need to worry about side-channel
resistance), and more exotic algorithms like SQIsign might even enter the fray. And of course, we have the eternally-cool
merkle trees for root certificates. We won't need to worry about, eg, SQIsign being (mis)used for handshakes, and a side-
channel key recovery attack breaking a significant portion of the encrypted internet.

So, I want to pose a few questions to the mailing list:

1. Should we only consider the AuthKEM family of handshake algorithms for use within PQ CertificateVerify messages?
(In other words, forbid "real" signature algorithms for use within the handshake process)

2. Should we segment handshake schemes into different use cases based on their side channel resistance?
(eg, allowing FN-DSA for offline signatures, but forbidding them for online/handshake signatures)

3. Are experimental post-quantum handshakes ready to go into TLS without the seatbelt?
Personally, I’d say yes: if an attack is found, loss-of-confidentiality is limited to active attacks, and
clients can be updated to reject the insecure algorithm, which allows us to contain the blast radius.
(This is in contrast to eg. Standalone ML-KEM, where compromise means years of retroactive confidentiality loss)


Best,
Joshua Nabors


P.S. This has nothing to do with the dilithium2 draft published recently; if it means anything, I support its publication.

P.P.S. I would like to add “Futureproofing (the) Internet’s Secure Handshaking” (FISH) to the backronyms bucket.
“Marine Biologists” has a nice ring to it :^)