[TLS] Re: [EXT] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3

Andrey Jivsov <crypto@brainhub.org> Thu, 17 April 2025 21:52 UTC

Return-Path: <brainhubr@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id D14D51DD61CA for <tls@mail2.ietf.org>; Thu, 17 Apr 2025 14:52:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hlMqX0duGiOg for <tls@mail2.ietf.org>; Thu, 17 Apr 2025 14:52:44 -0700 (PDT)
Received: from mail-vk1-f172.google.com (mail-vk1-f172.google.com [209.85.221.172]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 28E6A1DD61B6 for <tls@ietf.org>; Thu, 17 Apr 2025 14:52:44 -0700 (PDT)
Received: by mail-vk1-f172.google.com with SMTP id 71dfb90a1353d-524038ba657so1191401e0c.0 for <tls@ietf.org>; Thu, 17 Apr 2025 14:52:44 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1744926763; x=1745531563; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=t6bitnoUBASHkWEufS4/0b8meKGRnw6LGvt1xXT6Fy0=; b=jCdgsufcYvHXNlnLStu3uxkBji2m7OhDG+erzsnez+WEXZyZ0t7VCZEExUfin39vjy XV6bum5rlU+cTzjFMbvFMEGNWnJ3ZLAGOJX3UeeClFa/eml4GIJxuZa7rbrZdJkVBuua AnNL7GMfQddkEHFfaB9TDVJ7mhlEJPMagbLOEkWheyRSChIYl6qc1CctxUkY6Lwy6uLf IBUGYzs528beW9wVUODEXpbgbVxoYxHEpR+VMBGSSYxRrb/Ybwq1+tPfD+aEyn9x1hb8 MDGfPRjTRtfWXaYMg4WmEWT0RkOmEZbJaymUni1H5PUzAGFUiKH/DQMv6Y/mtrKDQ6fS PE1A==
X-Gm-Message-State: AOJu0Ywj4iFVYeq0z7W8t8fc6PrEGrY2Ig643Bm2NoLRNDnfRMVMFdb4 DIScqtZNmONE2nr5LQe7mszIwD6BN6EgSk4+3vGBWSqJQ8uTck7iohYruw==
X-Gm-Gg: ASbGnctnkACpw/dW9oz6t9aKYn4mVGlCK1f53UrP/EWWRIiB7syfwTB0inDc81gpO0H 7J4NNhz9Ii8//5Nc/JWYAjsM4AC1p4UFsL4AKSOlqMlFJ93WYhdhRp+cl8I4O4CT5lr3pjoE3GU 7xavSHLoltaS//cyodu79lEcAFGefqrIpe2qYuI20IvqcrSpzRre6sd8GSYrtqhkQ85reyXmRY4 86ooeVvL2fdnLgSOTe1Y3RyV1ZVG3NFcdqlpYJYYfkg0vHAjUQdqj5H9v2d99MsDH+DoVje70kW olWw5koGcXB3dgE0dhIyloIKe4pGgCr8WfwK49olMiKtleYPNj7xg7BguRxDkUetsfFanWbr8fW ApHH4wA==
X-Google-Smtp-Source: AGHT+IFaQJvrCf3p0dAugbWK3gkztchw21d5s5MIyisQdZPVZp6RNM5MZ6/tcbySm6T5CbCsXcWClQ==
X-Received: by 2002:a05:6122:6008:b0:523:e4c6:dddb with SMTP id 71dfb90a1353d-529229c7a82mr2334119e0c.0.1744926763438; Thu, 17 Apr 2025 14:52:43 -0700 (PDT)
Received: from mail-vk1-f177.google.com (mail-vk1-f177.google.com. [209.85.221.177]) by smtp.gmail.com with ESMTPSA id a1e0cc1a2514c-87764654c5csm141410241.5.2025.04.17.14.52.43 for <tls@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 17 Apr 2025 14:52:43 -0700 (PDT)
Received: by mail-vk1-f177.google.com with SMTP id 71dfb90a1353d-5290be1aedcso1901843e0c.1 for <tls@ietf.org>; Thu, 17 Apr 2025 14:52:43 -0700 (PDT)
X-Received: by 2002:a05:6122:30a8:b0:50d:39aa:7881 with SMTP id 71dfb90a1353d-5292659d861mr581434e0c.0.1744926763099; Thu, 17 Apr 2025 14:52:43 -0700 (PDT)
MIME-Version: 1.0
References: <5dd1e81a-c37a-ceff-b89e-b4335fca07b6@nohats.ca> <56e646395f67e27ff11a092d5989c1c85eba2563.camel@aisec.fraunhofer.de> <CAOp4FwSJpvn6f=3utd4yBE=ftkXQ4h38FT3VQ1XOhrubqgu0ng@mail.gmail.com> <BN0P110MB1419E8DB9B38B33F41A6234590BCA@BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM> <IA1PR17MB64212A6A5AC34467EB83F2A5CDBC2@IA1PR17MB6421.namprd17.prod.outlook.com> <BN0P110MB141930A9829053013376FF7C90BCA@BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <BN0P110MB141930A9829053013376FF7C90BCA@BN0P110MB1419.NAMP110.PROD.OUTLOOK.COM>
From: Andrey Jivsov <crypto@brainhub.org>
Date: Thu, 17 Apr 2025 14:52:30 -0700
X-Gmail-Original-Message-ID: <CAAWw3Ri+uTdB+UaazD_mKD6ZhoWpW+8H-O2oq0fes-KKBKMv7A@mail.gmail.com>
X-Gm-Features: ATxdqUG1YMom3ewvY_bIFp9AMLQPvZY2-Oe_JdsW576w3txRKLh5P9SsNODInG8
Message-ID: <CAAWw3Ri+uTdB+UaazD_mKD6ZhoWpW+8H-O2oq0fes-KKBKMv7A@mail.gmail.com>
To: "tls@ietf.org" <tls@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dfb5040633006bc9"
Message-ID-Hash: VAKW64NNKMKVR44EXNRTDSCPNKNVWFAW
X-Message-ID-Hash: VAKW64NNKMKVR44EXNRTDSCPNKNVWFAW
X-MailFrom: brainhubr@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: [EXT] Re: WG Adoption Call for ML-KEM Post-Quantum Key Agreement for TLS 1.3
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/R_ubQUJ9mvq2h3Mg8cFzxbADsfk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

With due respect to other opinions, I don't find these concerns below as
significant.

- The classical crypto, e.g. ECDH, will need to stay around for some time,
and that means that classical crypto code must remain correct.
- Test vectors should catch regressions during maintenance
- When QC becomes practical, there is no security need to disable ECDH. If
the code can be updated, code can be optimized to use fixed private keys
(e.g. equivalent to 1 or 2) -- it's just "encoding" at that point.
- The private key should be viewed as one key that includes the ECDH and
ML-KEM keys.

- Not sure why PKI is mentioned, but I think that signing certificates
should take the approach of a single algorithm corresponding to
ML-DSA+ECDSA (or ML-DSA+EdDSA). Functionally, this will be similar to a
pure ML-DSA certificate chain. If you meant by "parallel" that a
post-quantum certificate chain needs to be set up in addition to the
classical certificate chain, that's eventually inevitable. If we consider
the world where composite certificate chains must be supported, then a pure
ML-DSA chain, likewise, adds complexity and confusion in that it needs to
be supported as a yet another parallel chain. The major problem here is
that in some cases one must pick up a single algorithm, which cannot be
negotiated or even configured.


On Thu, Apr 17, 2025 at 2:17 PM Blumenthal, Uri - 0553 - MITLL <
uri@ll.mit.edu> wrote:

> I consider risks associated with hybrids, so my deployment will not use
> them.
>
>
>
> Care to share? Perhaps you know something that many others don’t.
>
>
>
> I know that (purely) cryptographically “as strong or stronger” is not the
> end. Which many others don’t seem to take into account, or even care about.
>
>
>
> There’s maintenance of the code for both parts of the KEM and ensuring
> they’re properly integrated, maintenance of parallel PKI structures, need
> to allocate the costs for two moves [1] instead of one which already makes
> some users argue (which can be a royal pain in a large deployment), likely
> many other things I’m too lazy to concentrate on now (besides, there’s that
> feeling that I don’t need to convince “my” clientele at all, and there’s
> little chance to convince this audience anyway, which dampens the eagerness
> to strive).
>
>
>
> In short, all those factors of actually running a *large* conglomerate of
> organizations…
>
>
>
>
>
> [1] One move – to the PQ (in whatever form), then – once people (even
> those now-dissenting here) decide that enough decades have passed, and we
> can consider Lattice-based as reliable as ECC (apparently, two decades of
> study is not enough – would three suffice? Four? Five? Would we still want
> hybrids even after CRQC appear?) – another move to dump the Classic part.
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>