[TLS] Re: What about AuthKEM? / Online-Offline signature split

Loganaden Velvindron <loganaden@gmail.com> Tue, 07 April 2026 19:08 UTC

Return-Path: <loganaden@gmail.com>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 11A1FD7A7B5D for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 12:08:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775588904; bh=Cd04DNY4en+kjQytpH7DIg6UlimAXA4BPAE6uobeygE=; h=References:In-Reply-To:From:Date:Subject:To:Cc; b=rXwGgd0AEw1YPNkQ2isA9nqwkAD1V9FB33Qo/1EnhIe9QuDPBgJBLSQPNDdlfHa1P WCGTjComKFoWDtB+BTn8dN1ZltbT5ZVim53qYgbwIaC1h405rRwrPKm3EgXKuVy6QX QNYukZuaxsHPDVrTFrMTwAiKOLYcee5qPaQgHZAE=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pZq6_kF2zWR5 for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 12:08:23 -0700 (PDT)
Received: from mail-pj1-x1034.google.com (mail-pj1-x1034.google.com [IPv6:2607:f8b0:4864:20::1034]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4472CD7A7B56 for <tls@ietf.org>; Tue, 7 Apr 2026 12:08:23 -0700 (PDT)
Received: by mail-pj1-x1034.google.com with SMTP id 98e67ed59e1d1-35d965648a2so4223308a91.0 for <tls@ietf.org>; Tue, 07 Apr 2026 12:08:23 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; t=1775588902; cv=none; d=google.com; s=arc-20240605; b=JrGp0sxzdpDCmnC+Ty1qnAwtvVpfr+OKNSrICxxsMzPZ37DEjMqdp3sMKoun1IChXv AoNzSwSAOlQkecuEtqnjxmTGIdsp+NwmP+VkPrP0femJKYhlRssNtfGX+vE77BVkLpjy 3MUu+rnwebJakpDgJezFDXaPjBu7sBjTYzOBwYczuCrEJICKz/gw5h4B3SyHtcnkYwd8 foznNYsLlQDocuplTyKGl16IJuQ2GAu3/utN/lqHnBZpt9clWvVtwW183qGAGxgseryY WHlXecUmB/U6MQ/kNGbgLfiE4fz8ZaKBSLPqA4J8BukULgn6zEYE9lAF4xQNCJtX2GqG hCQw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=XMf5PhHzdaUv4e3tYdQAGOklcZdd/s96/kORz+jhQug=; fh=j2v/YCWZyieLz3QxrRkMhKSXrI22vJ3VpI+EWzHedDg=; b=SxXmkW8Ko15p2gwiH0nLmRer/fF0sbsxvZ7DmBCTlvzzF0Apf7NPCKxlELBZDuh8+g iHdkCQxGpULRESMUhI3HD2ibfBUgOsfj5POXZWQSYH+JR8g2EmLeIgiJN90zD6YChQfb dFc4I5OduOL+T4SP9aypmS7+62/1PVS3PcP4K/aqbZxcPU8LgmNCOz6wETQrnM7sUG3F 8YI8DCT6S2i1k4VNmI9vvswzYGgNm148WSDlWJAwW2rwNmsH8BVAcFNWWjWoDvzXg9jP xwVpS5J0FxCUFRa0qmHU52vRHaw0YXScfjbrGrIAs6iHKu1CqklAjnoZrvDIdq99hHcB CgYQ==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775588902; x=1776193702; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=XMf5PhHzdaUv4e3tYdQAGOklcZdd/s96/kORz+jhQug=; b=PF854WTKpRQar2giD3kZTBTNX9D68sFGg1cqSnY4zdX2bmhlOaJbP/ctfswkAh8n/d AHPoEb0ixpqZgk5UGWWBF4kHPqggZ/669R/56CN1k80Q5qGR+sZC+NJJZbcyKhMW9NmO 5lCw811Wyx76E6+cjirp6en2HpIJduurfeMy2W42Zu+y/ILF5leiy44APVcNSa2OElDR LwERDk6lJJY3MK6ec0AmLb4XRYZMsweumW1FCOr3MlkxkXaRFaXqTjTAhCEyN23UhM9p /h2Jo537zhAgWkgKkBe1DaHbvzeU1KZKiuCDVQ7GD913s5yrxMmqSqTvm2XK7kMFGMzp FrRg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775588902; x=1776193702; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=XMf5PhHzdaUv4e3tYdQAGOklcZdd/s96/kORz+jhQug=; b=Kc4MPwGTl+gVnNAXLTyl1jhNcSUV2b0wQY6Q/Gg7f6oeFmk1uM7ND1jZ4Z7p983vKr bXOOtgNmCjefuD+iZjUBYzoRGP/LBrFvOeVZyTjKIxe+F6fueeBD9cAHHk4bTYnhXGmZ MiDUXaz9jANw4z8A0xtlNtHOAqvroH0JWjpvg9uy9O6xuT8s3ZtOwNeKjWGZxXBlpNj4 xsTIJpP0+ePDyqmDusF8lOVg3J4IU/UrdDil7BPAByAA+nrDam6PC4rj0oaDghhZflUT MouF/Guxt9wOMW96Xzh3KxsR/PtsAE8smAn7ilYSvskE5lWDNdX9Fkpl3OlSj/ZwHmzm Mkcw==
X-Forwarded-Encrypted: i=1; AJvYcCWoAjuSCyRDCnoKMfrGCzBmACLlLkOuGAYj14GSIvcc0i6gOtSHXSjwq9Mc+uu4NSDSCps=@ietf.org
X-Gm-Message-State: AOJu0YyxIPaspj44f2D9192nodqpCCsPdAuA1ii09N55k2e/1zapwMCb gh7ifzjjFckr9zyTkHEayJjIRkmpa+Y7PFO5dm9zsl7B5mNqQ8qg68lIFEH/cGMAixvfBKo5Ihq 8TgLYRJr7D+swjrqxjPgqGMtre3V5Dan5fw==
X-Gm-Gg: AeBDieuqTz+QDbCUbWP9Q2eAQHtphp7Qw222RckOE9UPeSLqcJE4pYGbL0ulnXzYgqt PWzvnfo2Ejq+l9d6lo+FA1AaFlC5vXXZGfRyQj5SgdI3esHZmf2nkG1mYNwZzAEXv9z6VjwjT+x dJWNmUarqIS7ShzIQIZNvxgiAWZx4wohz0A7G9AQ9/yhLBDL0NbRHfFyiYPKOVDWitGNsYZRonl 9lPtEmvd6/i0vSO5NSqW6AbGfG8e05iFxpCkSMmJJ7gqGEW8r7QSEbGAooKErMMvHdiZdyY5UJW wjOtrurFr5v4XzpyoA9CchrX+ldrHj7XPLWI8Sv2kfLN9MW3GQI=
X-Received: by 2002:a17:90b:2ccc:b0:35d:935f:2ff with SMTP id 98e67ed59e1d1-35de67db9e2mr16332893a91.2.1775588902231; Tue, 07 Apr 2026 12:08:22 -0700 (PDT)
MIME-Version: 1.0
References: <MgNiohcykfGTjVuD5YkbKNofLPqoyyHJ31KztG3nKi06534S8J_yg4FIkYjlyRiGoCHMMn5UohbTMnjSULxnKRDCDaZEwelhtW0jAwRjy-U=@marionberry.net> <CAPxHsS+EDEYA-Sx5i-j_eFsePmNj3tPc3Nrjgqj_W75Chq+yUQ@mail.gmail.com>
In-Reply-To: <CAPxHsS+EDEYA-Sx5i-j_eFsePmNj3tPc3Nrjgqj_W75Chq+yUQ@mail.gmail.com>
From: Loganaden Velvindron <loganaden@gmail.com>
Date: Tue, 07 Apr 2026 23:08:10 +0400
X-Gm-Features: AQROBzAzsknmPuD7Y7obWlHUdZByPWcETInw4MhdLx-mGor1m_W_REjzk8xf68k
Message-ID: <CAOp4FwRNyCXQeyj4CLPXng21CeDjUCuVf4BinFRsAN_EavCAuQ@mail.gmail.com>
To: Daniel Apon <dapon.crypto@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000c8e2fa064ee38108"
Message-ID-Hash: EW4EVZUO2ZI4UB5SOMUD6FOE7ZLPGV4M
X-Message-ID-Hash: EW4EVZUO2ZI4UB5SOMUD6FOE7ZLPGV4M
X-MailFrom: loganaden@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Joshua <joshua=40marionberry.net@dmarc.ietf.org>, "<tls@ietf.org>" <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: What about AuthKEM? / Online-Offline signature split
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/xU885tBZORTuueRjAk1aERdDMxg>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

On Mon, 06 Apr 2026, 03:34 Daniel Apon, <dapon.crypto@gmail.com> wrote:

> " 1.  Should we .. forbid "real" signature algorithms ..? "
>
> In my opinion, no.
> KEMTLS is fantastic, but KEMTLS doesn't seem like a reason on its own to
> *forbid* digital signatures (beyond certificates on long-term KEM PKs, of
> course, where they're required for KEMTLS).
>
>
> " 2.  .. FN-DSA .."
>
> Right... -- show me your copy of the FIPS 206 draft first :)
> I've had dating relationships I'd consider "long term" and "serious" that
> have lasted less time than the 4+ year window from 2022 (Falcon selected)
> to now (still no FN-DSA draft available).
> !remindme 1 year
>
>
> " 3.  Are experimental post-quantum handshakes ready to go into TLS
> without the seatbelt? "
>
> In my opinion, no.
> Protocol standards should not get ahead of primitive standards.
>
Why shouldn't  protocol standards get experienced with pre standardized
primitive standards?

Doesn't that help to get primitive standards moving forward?



>
> Kind regards,
> --Daniel
>
> On Thu, Apr 2, 2026 at 6:29 PM Joshua <joshua=
> 40marionberry.net@dmarc.ietf.org> wrote:
>
>> While the horticulturalists over at PLANTS has been working on some
>> really cool stuff regarding tree signatures,
>> I wanted to revive an idea that’s been toyed with in the past: what if we
>> move away from signature suites for
>> handshaking, and move to exclusively AuthKEM-based handshakes?
>>
>> AuthKEM has some advantages over “normal” Signatures. Chiefly, we are
>> using signature algorithms designed to be
>> provable to anyone, anywhere, and using them in cases where only one
>> person will ever need to verify them. This
>> has real impacts on the attack surface; non-constant-time signature
>> generation can lead to key recovery attacks,
>> implementation errors can lead to key recovery attacks, implementations
>> can potentially be tricked into signing
>> maliciously crafted plaintexts, etc. On the contrary, AuthKEM "proofs"
>> are very localized; an AuthKEM "signature"
>> can't easily be passed on and verified by third parties.
>>
>> Overall, 3DH-esque authentication schemes are simpler, faster, and
>> smaller than their comparative signature-based
>> authentication schemes. (Kyber512 is used to illustrate, but I do not
>> recommend it's adoption)
>> - Dilithium2 requires 3,700 bytes to communicate a pk/sig pair, whereas
>> AuthKEM-Kyber512 requires less than half
>>   at 1,500 bytes;
>> - Dilithium2 requires about 300kilocycles to generate a proof, whereas
>> decapsulating a AuthKEM-Kyber512 secret
>>   can go as low as ~30kilocycles;
>> - Dilithium2 requires both a correct constant-time PQ KEM and a correct
>> constant-time PQ signature algorithm,
>>   whereas AuthKEM-Kyber requires only a correct constant-time PQ KEM.
>>
>> For example, consider the issues with Ed25519, generally considered one
>> of the more bulletproof signature schemes
>> available/widely deployed today:
>> - Despite having constant-time point addition, a constant-time scalarmult
>> ladder is required to avoid side-channels;
>> - A single bit-flip during signing exposes the private key immediately,
>> and implementation errors compound this problem;
>>   - This also occurs when signing with a mismatched private/public
>> keypair (which some implementations used to allow)
>>
>> These benefits* have, of course, already been enumerated in the AuthKEM
>> I-D, available here:
>> https://datatracker.ietf.org/doc/draft-celi-wiggers-tls-authkem/
>>
>>    * Debatably “benefits” based on your use case, hence why I’m writing
>> this email.
>>
>> That's not to say that lattice-based signature schemes are a bad idea; on
>> the contrary, I think saying "we should
>> only use AuthKEM for authentication" frees us to consider more optimal
>> signature schemes for each step in the chain.
>> For example, FN-DSA is a perfect fit for chain signatures (especially
>> since we don't need to worry about side-channel
>> resistance), and more exotic algorithms like SQIsign might even enter the
>> fray. And of course, we have the eternally-cool
>> merkle trees for root certificates. We won't need to worry about, eg,
>> SQIsign being (mis)used for handshakes, and a side-
>> channel key recovery attack breaking a significant portion of the
>> encrypted internet.
>>
>> So, I want to pose a few questions to the mailing list:
>>
>> 1.  Should we only consider the AuthKEM family of handshake algorithms
>> for use within PQ CertificateVerify messages?
>>     (In other words, forbid "real" signature algorithms for use within
>> the handshake process)
>>
>> 2.  Should we segment handshake schemes into different use cases based on
>> their side channel resistance?
>>     (eg, allowing FN-DSA for offline signatures, but forbidding them for
>> online/handshake signatures)
>>
>> 3.  Are experimental post-quantum handshakes ready to go into TLS without
>> the seatbelt?
>>     Personally, I’d say yes: if an attack is found,
>> loss-of-confidentiality is limited to active attacks, and
>>     clients can be updated to reject the insecure algorithm, which allows
>> us to contain the blast radius.
>>     (This is in contrast to eg. Standalone ML-KEM, where compromise means
>> years of retroactive confidentiality loss)
>>
>>
>> Best,
>> Joshua Nabors
>>
>>
>> P.S. This has nothing to do with the dilithium2 draft published recently;
>> if it means anything, I support its publication.
>>
>> P.P.S. I would like to add “Futureproofing (the) Internet’s Secure
>> Handshaking” (FISH) to the backronyms bucket.
>> “Marine Biologists” has a nice ring to it
>> :^)_______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-leave@ietf.org
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>