[TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
John Mattsson <john.mattsson@ericsson.com> Wed, 26 November 2025 15:46 UTC
Return-Path: <john.mattsson@ericsson.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id BDA66911EDE0; Wed, 26 Nov 2025 07:46:09 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ericsson.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aKHxAXurNi8m; Wed, 26 Nov 2025 07:46:07 -0800 (PST)
Received: from MRWPR03CU001.outbound.protection.outlook.com (mail-francesouthazon11011065.outbound.protection.outlook.com [40.107.130.65]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4CF97911EDD3; Wed, 26 Nov 2025 07:46:07 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NDJaTk6K9LQOCeo+d66k+BnWMxJxLh/qSstnPuFCWOW2L7E4tQGmx/bqmC8yN3QRY2zauLpcRz/z/IzfCOWsKd8uNHDD1HY/fdK1pnVxjxAxKeuFGRiw3qjlVYuGBAHLnI9LQjnQS3GpkmSekxqhj3D7UaYCZrZ8/z1/61fGFdipmCjFj1LgzBBlwgfeN11/mpD/xZJfP3Rd/NgLk99qKzkoE5gNnvENdhGWg203zFP1UkH177Ezspq+HoXaC3MI5lo8Vee+Zw/H60iBjiU7LJAcP3ie/QCCYRgVRmPvV4KVgUn4aMniUkB/b61MS/D1eYu2FWHE+TLk+vD1MudyxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vipN7k3tb1xc/6VYpvSeIwr5M6kZFTETA3CeKYU/M0k=; b=deXsb8R4zQbkIbJrkFlZs6xUmO14cHB2HL8Sm+ohgyCZAbrFvoVI2kYfvdTb8EqgYdtLWRRKmoR/d1hROXAQ9rIP6VI9dUxRb0ICaQMy30265E1QfHiKOXzKifv9q1JEAZJlIUeKPvmjB8X9bHjZZvaC6spyOK9VLZMh3C4ET+V4vg0dLY6D+7H1jODOJc6AAtSI3htI6QS8Azd3Z6ODYw8pXZLAaZ/7ZtTaPTLQIIEnUDiROAUfZ00FwgbCs++XBtn7eDodOqALdKej6sQb0mz90Ja7R0QnLnjTTNGAZ85qMtycMHNwpfMqNROWCknbiLNN7akAfaHYOzkE1KcpYA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vipN7k3tb1xc/6VYpvSeIwr5M6kZFTETA3CeKYU/M0k=; b=xD/vOIpJnms61/sKJUGB8QLKR6QBFZL/QtFD5HyC7mMSUwIWXzUG+g7f6jtr18Ao4gJyc8AQbnPpsPuOaN11bvzZMq/IGwZpwIWzEcPeKMlJTbA1T20B06XbD7GDNLajdp69jL39/3tuv0BxuhKLTGreAPiHAa60lgSD7C3Dj8wNZ55PbW+B+2QtQy5JcdK7ReBqCI/b+YNeVY+UmJQGNakUa4zxqnrmjRDWfxGpThcnOVd0ug8cY6N/+T0ZLtF2dhWBGuMsBLRByyxdA8j0fBnKZ8AvMImCd/Xc7RUjVQ/eLzB68mlkuPYGZEIn3ueipfmA2LAUUNlI8eLBkjcwvQ==
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com (2603:10a6:150:114::10) by PA1PR07MB11367.eurprd07.prod.outlook.com (2603:10a6:102:555::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9366.12; Wed, 26 Nov 2025 15:45:58 +0000
Received: from GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8]) by GVXPR07MB9678.eurprd07.prod.outlook.com ([fe80::bcf3:3f45:888e:a4b8%3]) with mapi id 15.20.9366.009; Wed, 26 Nov 2025 15:45:58 +0000
From: John Mattsson <john.mattsson@ericsson.com>
To: "D. J. Bernstein" <djb@cr.yp.to>, "draft-ietf-tls-mlkem@ietf.org" <draft-ietf-tls-mlkem@ietf.org>, "tls-chairs@ietf.org" <tls-chairs@ietf.org>, "tls@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
Thread-Index: AQHcXZdeQBPyhE37cE2C33OwvtXsX7UDCVkAgAGd4TaAAD/ngIAAAR+1
Date: Wed, 26 Nov 2025 15:45:58 +0000
Message-ID: <GVXPR07MB96788DE24B191D5A2439E45589DEA@GVXPR07MB9678.eurprd07.prod.outlook.com>
References: <GVXPR07MB96784D1317779A8A29CC885889DEA@GVXPR07MB9678.eurprd07.prod.outlook.com> <20251126123533.342254.qmail@cr.yp.to>
In-Reply-To: <20251126123533.342254.qmail@cr.yp.to>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-reactions: allow
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GVXPR07MB9678:EE_|PA1PR07MB11367:EE_
x-ms-office365-filtering-correlation-id: 754aa9b0-f0d5-4c29-481d-08de2d02e491
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|4022899009|1800799024|366016|376014|13003099007|38070700021|8096899003;
x-microsoft-antispam-message-info: 2N5lLXiDRDRmuLGYDsnOb8+pDFt9Ju8Jf9Hd3/UlNWJGVZ3+zObaCKCls64cMQBlvxIf3gxl79MdBT2MEVkD1NXlhd0kjEgjPODnOP+bIQ+RMZ16fUYZhCBkWOZmlri9FfdE/fXnY9tbH3v3isLfFce4q6sRbufvhvFRMV9GE2bVg2lJrL8WF3ymKqAJwxQN4v4YIcyv+JOg8AM7hTYi5VOUtKijiwksMB4OBewW38HjNL6Xvv3+8sI+6RAIAsVcw+pyvlCnhqj2lYYvP0VBADmccBNTocBDgbVpWum9jRNAulq+v1SXDLHvgTpwn2R9M3tsWNddJDxAjctYai1uBXlj41+/B413LXU0NRR3XsFPz5BuInRYKwbLTeP8LjsMDhH5IaTPPH8IykpV2FL0vdj7PszuJMr0RCOPRMZU80T7bBQfJUOy2zh9ehl3OsEnJzkKTD6zNtJqLyxLAjCOw/JYzMhYuN3KxMyVrVl8xRdw3EoDTlFABhaK9TXbc9G9i1pRvsIp7r9sjfQ5GvShfjx0txOsAHS0agll9KIqp4nv3uQ/3VKqaTbSOjicxyNpguXE11OP5iGO0qlN6L7FAWiuC43ZBsg38QWHvGEhExM9SDJZLcHSMIfZyP9LPw5SKfPyyMQC1662SZKLF9wmy9mjmPNJlYZRie95PiEcCGUCsalrw3GnW51R0JeSGbNgx55Em6ZcvAQ2c/MxpmuG4UK6syubSkPtDXdPZnZ74WhEX3c0fQWMpqU9FqNbBGvwVX3OrGSxjZveqSdwKsZECISqGqOR7P3TjtvRLd7bMKIST/ldJOQwYo+dq1qqN54qSW9ExoWTENoYxfozyOiAx4wHkTTc9qkDh4g0PZEu9dfQ8dN68T2FlyDqJdoy/dc1rd55YpCvzKQXIuOK3GKDWImm53S+AwNe2SD9ObEcy1veY4UjMAy6WA8ClhpHa/2WNT5zB0RoaIlT54sv2gKpuyrthmEoGVUKruapnkbf01J3HpxMpSX3LD/GkZZ9mvklFCM1HT3HAoXbra2VVC8BdEvBSC0CcDd3lOjfryezRn5XNTxDYsmKFDxlmO0dB9bn7FXTDMTC0tn55x1Nbtlj2Iwzy1mxR+vxs6is4yAX/h3RkaskQLJgSYGjgZ7PJ/xB7stosKvcL+eJoTytlPB4yF4gjL9MKa+WN9OdqlTUa+Xo7PzJJtHfAFltkcQq7MIf/gUaH20bzVvDh8HTl4OtVP73UJhU5GZ9vpGvF5i85Mb89581avYX+4Gp5y9g83uV+HOj2Z95i5V7kQNvFzjCNvXQgWQpRlorPHWMBfvWLxhyOomTnSxp2nCkCe3E236+Q3Rb2NwKGgedW8LiSq/lueneldMBLnvbCgj+b/RTSXQkRhp8GzT7R/pq3GyJdbd35V9AuOj/tW6KA9gt3BHECmqX7spW1KYpzNN1np4EY4vKsKhmpzQEeYDjKZ9MoyMt58DYVtHhvWu43wutAA8YjA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVXPR07MB9678.eurprd07.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(4022899009)(1800799024)(366016)(376014)(13003099007)(38070700021)(8096899003);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GVXPR07MB96788DE24B191D5A2439E45589DEAGVXPR07MB9678eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GVXPR07MB9678.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 754aa9b0-f0d5-4c29-481d-08de2d02e491
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Nov 2025 15:45:58.0602 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kA5ThgxaQpcoUWV8mpBQsSd8mxAXcq7aXiaILMYe2BUfVhtTw2bMGzM0syiQWS6xNdk1FOtgm6Z4W/aAu/qob5FS81kxfsn957MzWrWYho0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PA1PR07MB11367
Message-ID-Hash: 72DTK66N35AT5RJNLOA5D6KE27C6OGKL
X-Message-ID-Hash: 72DTK66N35AT5RJNLOA5D6KE27C6OGKL
X-MailFrom: john.mattsson@ericsson.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26)
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/elPhChTqKSkHTN5ECUlXsV9lshk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>
Dan Bernstein wrote: >All of the complexity arguments in favor of this draft (e.g., code-size arguments) are getting the situation backwards, as Andrey Jivsov pointed out during the adoption call. The draft adds PQ as an _extra_ option _beyond_ ECC+PQ, so it _increases_ the complexity of TLS software. TLS libraries such as wolfSSL, Mbed TLS, and BearSSL allow you to choose exactly which components are compiled. For very constrained systems, you typically enable as few algorithms as possible, since storage is often a primary limitation. In these environments, standalone ML-KEM certainly reduces code size, i.e., the size of the compiled binary, compared to ECC+PQ. In constrained systems, I think standalone ML-KEM-512 can be the best option when migrating to PQC. >How, then, would one argue that X25519+ML-KEM-512 _doesn't_ have roughly the same per-connection cost as non-hybrid ML-KEM-512? I have not made any claims about per-connection cost. You argued that “ECC+PQ has roughly the same performance properties as non-hybrid PQ,” and I pointed out that this is incorrect when you consider cycle counts and code size. >Sure, people will have different ideas of what the dividing line is for "roughly", but the gap in this case is _really_ small. (And even slightly smaller when one replaces ML-KEM-512 with ML-KEM-768.) This is not correct. On the platform Cloudflare is using, the difference in cycle counts is far from small. ML-KEM-768 is more than twice as fast as X25519. https://blog.cloudflare.com/pq-2025/#ml-kem-versus-x25519 Whether this performance gain matters is a separate question. For non-constrained environments such as the Web, I agree that the cost is negligible, and in any case, the extra cycles are worthwhile until we have more thoroughly hardened ML-KEM implementations. However, some people on this list have claimed that, for performance reasons, they intend to reuse “ephemeral” X25519MLKEM768 key shares, despite this violating FIPS 203. But likely most instances of static keys in TLS 1.3, are motivated by discouraged interception practices rather than by performance concerns. I think standalone ML-KEM with its superior performance is a good argument against people arguing that key reuse is needed for X25519MLKEM768. Beyond the substantial security and privacy vulnerabilities, the TLS WG should consider how reuse of ephemeral key shares aligns with the NIST statement that “the licensed patents be freely available to be practiced by any implementer of the ML-KEM algorithm as published by NIST,”. I don't think the IETF should publish any RFC suggesting implementations may skip NIST requirements. >Even assuming, arguendo, that 1184 bytes for ML-KEM-768 cause "many" problems, that 800 bytes for ML-KEM-512 do much better, and that this outweighs the additional risks of ML-KEM-512, how is this supposed to be an argument for omitting the X25519 part? Are you claiming that there's a big difference in rejection rates between 800 bytes and 832 bytes? There is likely no meaningful difference in rejection rates between 800 bytes and 832 bytes. As I have said on the list, I would have liked to see an X25519MLKEM512 option. However, the current situation is that the TLS WG has decided to work only on X25519MLKEM512, SecP256r1MLKEM768, SecP384r1MLKEM1024, ML-KEM-512, ML-KEM-768, and ML-KEM-1024. Among these, only ML-KEM-512 passes through legacy middleboxes. In an ideal world, all of these middleboxes would be updated or replaced. But based on past experience, many of them will likely remain in service for decades. This means that without ML-KEM-512 (or X25519MLKEM512), we will not only need to support, but also actively use, quantum-vulnerable algorithms for far longer than I would like. Cheers, John Preuß Mattsson From: D. J. Bernstein <djb@cr.yp.to> Date: Wednesday, 26 November 2025 at 13:36 To: draft-ietf-tls-mlkem@ietf.org <draft-ietf-tls-mlkem@ietf.org>, tls-chairs@ietf.org <tls-chairs@ietf.org>, tls@ietf.org <tls@ietf.org> Subject: [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (Ends 2025-11-26) John Mattsson writes: > Dan Bernstein wrote: > > ECC+PQ has roughly the same performance properties as non-hybrid PQ > This is not correct. A hybrid such as X25519 + ML-KEM requires > substantially more cycles and code size than standalone ML-KEM. All of the complexity arguments in favor of this draft (e.g., code-size arguments) are getting the situation backwards, as Andrey Jivsov pointed out during the adoption call. The draft adds PQ as an _extra_ option _beyond_ ECC+PQ, so it _increases_ the complexity of TLS software. For example, one advertisement we've heard for this draft is that OpenSSL added an implementation of the draft. Did this remove the X25519 code from OpenSSL? Of course not. It's wrong to portray the draft as reducing code size; that's simply not what the draft does. As for per-connection costs (such as cycles), let's look at the numbers. https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.cr.yp.to%2F20240102-hybrid.html&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914181259%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=eZ3200H4PIGn4UpewRuwPY96KbNSi2NUq5j5UflLcpQ%3D&reserved=0<https://blog.cr.yp.to/20240102-hybrid.html> reviews how to do an X25519 key exchange for roughly 2^-34 dollars of computation (per side) plus roughly 2^-34 dollars of network traffic (per side). It continues as follows: "Sending an 800-byte key and receiving a 768-byte ciphertext for the smallest Kyber option, Kyber-512, costs roughly 2^-29 dollars. Including X25519 adds roughly 7% to that." How, then, would one argue that X25519+ML-KEM-512 _doesn't_ have roughly the same per-connection cost as non-hybrid ML-KEM-512? Sure, people will have different ideas of what the dividing line is for "roughly", but the gap in this case is _really_ small. (And even slightly smaller when one replaces ML-KEM-512 with ML-KEM-768.) Obviously one can tilt the comparison, maybe even enough to turn 7% into something that sounds like a big deal, by selecting some tiny CPU (to pump up the computation costs) attached to high-end network equipment (to avoid pumping up the networking costs). But corner cases can't contradict "roughly the same performance properties". The performance differences between ECC+PQ and PQ are even less noticeable in the context of overall application costs. For example, at Meta, only 1 out of every 2000 CPU cycles is used for ECC, so the computation cost of ECC (and also of ECC+PQ with typical PQ choices) is roughly 0. > > This document was introduced in pursuit of "CNSA 2.0 compliance" > That claim "Claim"? This is a direct quote from https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.archive.org%2Fweb%2F20250613195524%2Fhttps%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Ftls%2FqFRxBSnEPJcdlt7MO0cIL2kW5qc%2F&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914207599%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=hFehDW5CQTQmogHBhRS4h3OXq0WgKtbVoIgbbNEibQE%3D&reserved=0<https://web.archive.org/web/20250613195524/https://mailarchive.ietf.org/arch/msg/tls/qFRxBSnEPJcdlt7MO0cIL2kW5qc/> which was the motivation statement straight from the document author at the time of introducing the document. That statement went on to cite https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmedia.defense.gov%2F2022%2FSep%2F07%2F2003071834%2F-1%2F-1%2F0%2FCSA_CNSA_2.0_ALGORITHMS_.PDF&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914229395%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=6t2JJFaJQ82MQpV5OHXjAS%2BHUW3DCPXuwOdSi4TfTSs%3D&reserved=0<https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF> which at the time was the 2022 version of NSA's CNSA 2.0 PDF; NSA doesn't maintain stable URLs but https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.archive.org%2Fweb%2F20220908002358%2Fhttps%3A%2F%2Fmedia.defense.gov%2F2022%2FSep%2F07%2F2003071834%2F-1%2F-1%2F0%2FCSA_CNSA_2.0_ALGORITHMS_.PDF&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914249729%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=OtkS64JwAVNlstU7%2B0LWzvI2hJmGnZbSoJi7eacbx34%3D&reserved=0<https://web.archive.org/web/20220908002358/https://media.defense.gov/2022/Sep/07/2003071834/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS_.PDF> has an archived copy. > is contradicted by the inclusion of ML-KEM-512 and ML-KEM-768 I already pointed out other flaws in the CNSA 2.0 compliance argument. Most importantly, the compliance claim is flatly contradicted by NSA's official CNSA 2.0 PDF saying "hybrid solutions may be allowed or required due to protocol standards". See the last URL above, or https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.archive.org%2Fweb%2F20250827175413%2Fhttps%3A%2F%2Fmedia.defense.gov%2F2025%2FMay%2F30%2F2003728741%2F-1%2F-1%2F0%2FCSA_CNSA_2.0_ALGORITHMS.PDF&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914266316%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=UI4f2pLeBrq%2FY1fL39dg0bK5hjJnHsj%2Ba2pJ3gsl%2B1M%3D&reserved=0<https://web.archive.org/web/20250827175413/https://media.defense.gov/2025/May/30/2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF> which is an archived copy of NSA's official 2025 update of the CNSA 2.0 PDF. This doesn't change the fact that the document was introduced in pursuit of "CNSA 2.0 compliance", as I said. I don't understand how you think you're contradicting this. The fact that there's a flaw in the stated motivation doesn't mean that it isn't what was stated. > the large X25519MLKEM768 key shares causes many legacy middleboxes to > reject the connection. In such environments, I think it is preferable > to rely on ML-KEM-512 Even assuming, arguendo, that 1184 bytes for ML-KEM-768 cause "many" problems, that 800 bytes for ML-KEM-512 do much better, and that this outweighs the additional risks of ML-KEM-512, how is this supposed to be an argument for omitting the X25519 part? Are you claiming that there's a big difference in rejection rates between 800 bytes and 832 bytes? ---D. J. Bernstein ===== NOTICES ===== This document may not be modified, and derivative works of it may not be created, and it may not be published except as an Internet-Draft. (That sentence is the official language from IETF's "Legend Instructions" for the situation that "the Contributor does not wish to allow modifications nor to allow publication as an RFC". I'm fine with redistribution of copies of this document; the issue is with modification. Legend language also appears in, e.g., RFC 5831. For further background on the relevant IETF rules, see https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcr.yp.to%2F2025%2F20251024-rules.pdf&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C46ecbd763485447d571608de2ce86949%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638997573914282493%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=RvOOiKVdC9zhJyzsZc5cwsLHXT4ktb6ruudF7UGvi0c%3D&reserved=0.)<https://cr.yp.to/2025/20251024-rules.pdf> _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-leave@ietf.org
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Quynh Dang
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kampanakis, Panos
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Yaakov Stein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Loganaden Velvindron
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: [EXT] Re: WG Last Call: draft-ietf-tls-… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… David Adrian
- [TLS] Re: [EXT] Re: WG Last Call: draft-ietf-tls-… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Rebecca Guthrie
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Flo D
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kazuho Oku
- [TLS] Fwd: Re: WG Last Call: draft-ietf-tls-mlkem… Keegan Dasilva Barbosa
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kris Kwiatkowski
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Filippo Valsorda
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kris Kwiatkowski
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bob Beck
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: [EXTERNAL] Re: WG Last Call: draft-ietf… Yaakov Stein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Russ Housley
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Simon Josefsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Simon Josefsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Watson Ladd
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Jan Schaumann
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Wang Guilin
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Blumenthal, Uri - 0553 - MITLL
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kurt Roeckx
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Kampanakis, Panos
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bellebaum, Thomas
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] WG Last Call: draft-ietf-tls-mlkem-05 (Ends… Sean Turner via Datatracker
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Watson Ladd
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… richard
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Benjamin Kaduk
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Peter Gutmann
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Deirdre Connolly
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Stephen Farrell
- [TLS] Deployability claims D. J. Bernstein
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Viktor Dukhovni
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Bas Westerbaan
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Muhammad Usama Sardar
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Eric Rescorla
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Salz, Rich
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… John Mattsson
- [TLS] Re: WG Last Call: draft-ietf-tls-mlkem-05 (… Joseph Salowey