[TLS]Re: I-D Action: draft-ietf-tls-hybrid-design-10.txt

Peter C <Peter.C@ncsc.gov.uk> Wed, 24 July 2024 13:39 UTC

Return-Path: <Peter.C@ncsc.gov.uk>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76918C18DB94 for <tls@ietfa.amsl.com>; Wed, 24 Jul 2024 06:39:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.709
X-Spam-Level:
X-Spam-Status: No, score=-2.709 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.453, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ncsc.gov.uk
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yzBjriUKjgHS for <tls@ietfa.amsl.com>; Wed, 24 Jul 2024 06:39:42 -0700 (PDT)
Received: from GBR01-LO4-obe.outbound.protection.outlook.com (mail-lo4gbr01on2054.outbound.protection.outlook.com [40.107.122.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E01A8C18DB84 for <tls@ietf.org>; Wed, 24 Jul 2024 06:39:41 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=LSeAPFpdkCjd+MMuVOVaRIcFvw8twfVH7NQga5hbYs5eSjIQooYAoNisWPXUdbeGLjTM9trWIpl1bIb/fgnHfqoxtQov1l9gAGSnlViWsaWOEQt+Nxb3bLkyRsP9NCqiAyDVEa9cj2NtHNmZM7xsYdrewHJrs/PsDyeDLjSlZ4TJWqIVJq33MFZIgqULRCU4dbfprikpHaHTN0EW367bvEJ4Q2IPhzlE8qpwiq6uZAERYMjrLaNW1UFgDOOjmIP3ha0x0ChvLnza+O/qVjVE68/9soO6pNAhAEM4uZH4yjLZRxTy/XZki44kxs+2HX+Mrljzb/Xw5JUNxKpOpBStGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pvH2Cuh/Qq6UVKiZ0UaIRHpVJF8x2t2XCaUgSdrzqRs=; b=Tr/M1g4Ng/cf/hXKTBjdSqYkX1gBcw0T73o8XF/pH6v9thkC+WrQH0ghlWHEP0vfRGpmQhf5OXerDF9Irq+4OpyCv6cBkeNA6hJY74S+Y4vpl8IzzhMjP75WD0iNh0BP+IQu5wBGzNo/PhKdOtmj+xGEEzB6sI747IhLzJjtsHgR9gmYHIE6b43LOZXPOOp0I1AO+Qb7BTdmJpbZGSK3HrMr9f62kN8igF5dUgycnLW3zxGTT6WHbvkESf6WuWf6cRy7rbSk9bGxDWbPxjaJfGK6mOsloLTaPROXQQqtu/do5T9hfbk0aZSqWFDf2JUTFsPpoSj+O31KKrqwuZ2IGg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ncsc.gov.uk; dmarc=pass action=none header.from=ncsc.gov.uk; dkim=pass header.d=ncsc.gov.uk; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ncsc.gov.uk; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pvH2Cuh/Qq6UVKiZ0UaIRHpVJF8x2t2XCaUgSdrzqRs=; b=MB+kvhfIcIhY9EBKegRoqPlGb7XgeSCAo6SFDKuKV9acqTHWCp8rAVDiYEQf2ho58VzYQB/wsiuPJpTSWAJ13ACzqdpLw4EW6QMUKRFQmBfIvH43kdA+RxPUSls8GFFjoZU2s4JIy6ZtDpog8p+AuY5C1axAjEiSpsd7U9JH0Hh3fB29+ISvfmQj+4PSf8o5/19RJIU8ls00+cYXJjsEVDulNe5vaoojMyfKIMFL4fnM05IwhngrO/iTjhCTTuxPfLmUrTVYCGBNKwEdDzKlthdy37Y2xUfvmo40l6IkWih212guD1tNytjoYyVjDvUSuGXkSWGl6DJzrtzPVJO1rQ==
Received: from LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:31d::15) by LO3P123MB3419.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:104::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.16; Wed, 24 Jul 2024 13:39:38 +0000
Received: from LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM ([fe80::b9d:11d:61c5:dba0]) by LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM ([fe80::b9d:11d:61c5:dba0%5]) with mapi id 15.20.7784.017; Wed, 24 Jul 2024 13:39:38 +0000
From: Peter C <Peter.C@ncsc.gov.uk>
To: Douglas Stebila <dstebila@uwaterloo.ca>
Thread-Topic: [TLS] I-D Action: draft-ietf-tls-hybrid-design-10.txt
Thread-Index: AQHah5drLHX9J8z4mEaCIaPuemwyELIGdC3Q
Date: Wed, 24 Jul 2024 13:39:38 +0000
Message-ID: <LO2P123MB70511E279A74AD16F80D4302BCAA2@LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM>
References: <171234865099.12734.12883553523407106230@ietfa.amsl.com>
In-Reply-To: <171234865099.12734.12883553523407106230@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ncsc.gov.uk;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: LO2P123MB7051:EE_|LO3P123MB3419:EE_
x-ms-office365-filtering-correlation-id: 69705fe2-ab66-48ae-a3d3-08dcabe61058
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|1800799024|366016|376014|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: ncsc.gov.uk
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: LO2P123MB7051.GBRP123.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 69705fe2-ab66-48ae-a3d3-08dcabe61058
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Jul 2024 13:39:38.4536 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 14aa5744-ece1-474e-a2d7-34f46dda64a1
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 1qbRnFHAgit2ECQrXk/2edrzIBbgT0pZu/v0lGb8kKN/+Cgs3fKPA77OGt3S8ytbG7lJAUsRPPlGNGAyRhn0dg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LO3P123MB3419
Message-ID-Hash: TF7R5L5QZGYDMFTJ4W6PBQDGEIT7CWEM
X-Message-ID-Hash: TF7R5L5QZGYDMFTJ4W6PBQDGEIT7CWEM
X-MailFrom: Peter.C@ncsc.gov.uk
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: TLS List <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS]Re: I-D Action: draft-ietf-tls-hybrid-design-10.txt
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/wFSwswG-Y2zJ3J5uCjIEwsyH8J8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Douglas,

The agenda for the TLS session is looking packed, and this is a very in-the-weeds comment, so I hope you don't mind me posting it to the list.  Happy to take any discussion off-list, if you'd prefer.

The draft-ietf-tls-hybrid-design security considerations currently say:

    The shared secrets computed in the hybrid key exchange should be
    computed in a way that achieves the "hybrid" property: the resulting
    secret is secure as long as at least one of the component key
    exchange algorithms is unbroken. See [GIACON] and [BINDEL] for an
    investigation of these issues.

If you assume the PQ KEM is IND-CCA2 secure, then I agree that [GIACON] and [BINDEL] imply that the derived traffic secrets will be indistinguishable from random and from each other.  The same is true if the KEM is only OW-CCA2 secure by Petcher-Campagna (https://ia.cr/2023/972)

If you assume the PQ KEM is broken, however, then [GIACON] and [BINDEL] do not apply since ECDH-as-a-KEM is not IND-CCA2 secure.  Similarly, Petcher-Campagna does not apply because ECDH is not OW-CCA2 secure.  Nor do I think it's possible to fall back on [DOWLING] since X25519 and NIST P-256 (as they are used in RFC 8446) do not satisfy the dual-snPRF-ODH assumption for any choice of KDF.  In this case, I don't believe the derived traffic secrets are guaranteed to be indistinguishable from random.

Flo raised similar points a couple of years ago which I don't think were fully addressed at the time.  I suspect this is just a security proof issue - the inclusion of the ciphertexts in the transcript hash should still protect against any actual attacks - and it's entirely possible that I've missed more recent results covering all of this.  If not, one easy solution might be to adopt the X-Wing approach and use

    concatenated_ss = pqkem_ss || ecdh_ss || ecdh_ct || ecdh_pk,

although this currently only works with ML-KEM.

Best,

Peter


> -----Original Message-----
> From: TLS <tls-bounces@ietf.org> On Behalf Of internet-drafts@ietf.org
> Sent: Friday, April 5, 2024 9:24 PM
> To: i-d-announce@ietf.org
> Cc: tls@ietf.org
> Subject: [TLS] I-D Action: draft-ietf-tls-hybrid-design-10.txt
>
> Internet-Draft draft-ietf-tls-hybrid-design-10.txt is now available. It is a
> work item of the Transport Layer Security (TLS) WG of the IETF.
>
>    Title:   Hybrid key exchange in TLS 1.3
>    Authors: Douglas Stebila
>             Scott Fluhrer
>             Shay Gueron
>    Name:    draft-ietf-tls-hybrid-design-10.txt
>    Pages:   24
>    Dates:   2024-04-05
>
> Abstract:
>
>    Hybrid key exchange refers to using multiple key exchange algorithms
>    simultaneously and combining the result with the goal of providing
>    security even if all but one of the component algorithms is broken.
>    It is motivated by transition to post-quantum cryptography.  This
>    document provides a construction for hybrid key exchange in the
>    Transport Layer Security (TLS) protocol version 1.3.
>
>    Discussion of this work is encouraged to happen on the TLS IETF
>    mailing list tls@ietf.org or on the GitHub repository which contains
>    the draft:
> https://github/.
> com%2Fdstebila%2Fdraft-ietf-tls-hybrid-
> design&data=05%7C02%7CPeter.C%40ncsc.gov.uk%7Cec161933c97947c8a7e0
> 08dc55ae8cd7%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C6384
> 79455373796379%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL
> CJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata
> =qNBE50aYk4woYCLUj6Rq1wMeFur63hP1MnHXDGihg80%3D&reserved=0.
>
> The IETF datatracker status page for this Internet-Draft is:
> https://datatra/
> cker.ietf.org%2Fdoc%2Fdraft-ietf-tls-hybrid-
> design%2F&data=05%7C02%7CPeter.C%40ncsc.gov.uk%7Cec161933c97947c8
> a7e008dc55ae8cd7%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C
> 638479455373796379%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM
> DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&s
> data=kVBR6kDc19NDTnC1fRgVqJmTnZOQggzmWk7wHHcVKbI%3D&reserved=
> 0
>
> There is also an HTML version available at:
> https://www.ie/
> tf.org%2Farchive%2Fid%2Fdraft-ietf-tls-hybrid-design-
> 10.html&data=05%7C02%7CPeter.C%40ncsc.gov.uk%7Cec161933c97947c8a7e
> 008dc55ae8cd7%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C638
> 479455373796379%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAi
> LCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdat
> a=dcjY38cicBXU6ab7hnMalN1WTWqtQdhblMYu7xdzVT8%3D&reserved=0
>
> A diff from the previous version is available at:
> https://author/
> -tools.ietf.org%2Fiddiff%3Furl2%3Ddraft-ietf-tls-hybrid-design-
> 10&data=05%7C02%7CPeter.C%40ncsc.gov.uk%7Cec161933c97947c8a7e008d
> c55ae8cd7%7C14aa5744ece1474ea2d734f46dda64a1%7C0%7C0%7C6384794
> 55373952646%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQ
> IjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=3ll
> ZNYcqaixqUpU%2BhzzNOigFmuDlrA6CxCrIvyiG5HI%3D&reserved=0
>
> Internet-Drafts are also available by rsync at:
> rsync.ietf.org::internet-drafts
>
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ie/
> tf.org%2Fmailman%2Flistinfo%2Ftls&data=05%7C02%7CPeter.C%40ncsc.gov.u
> k%7Cec161933c97947c8a7e008dc55ae8cd7%7C14aa5744ece1474ea2d734f46
> dda64a1%7C0%7C0%7C638479455373952646%7CUnknown%7CTWFpbGZsb3
> d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%
> 3D%7C0%7C%7C%7C&sdata=rFzF%2BExBIX03adggpWV4uxzcgfHR6Z0zCLamc
> GZIX9o%3D&reserved=0