[TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"

Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de> Tue, 07 April 2026 15:49 UTC

Return-Path: <muhammad_usama.sardar@tu-dresden.de>
X-Original-To: tls@mail2.ietf.org
Delivered-To: tls@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 4D4D3D78A4C2 for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 08:49:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775576968; bh=Jalx8PTA4Y1S3QC1cOk543qk5LnbMf/WZ9wz9irzQ+I=; h=Date:Subject:To:CC:References:From:In-Reply-To; b=JMDpBEO1YHIQoBlkXIH/80eoxBOtsstF0pVRwFxoSzHLtZY2faBhulOg4ws3Y41zP G168jyrLeFJxJfp55GWEDQ2rHIrF35uY7T1d6ovBsMkLdenPZWa9C25gINTfdB6vYP UpoJir+vjuRsSgQxoa67rde81+YnGn/uBoND6LxM=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.395
X-Spam-Level:
X-Spam-Status: No, score=-4.395 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_CERTIFIED_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=tu-dresden.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FmpfvYIO-CqK for <tls@mail2.ietf.org>; Tue, 7 Apr 2026 08:49:26 -0700 (PDT)
Received: from mailout3.zih.tu-dresden.de (mailout3.zih.tu-dresden.de [141.30.67.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6FCBED78A48A for <tls@ietf.org>; Tue, 7 Apr 2026 08:49:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tu-dresden.de; s=dkim2022; h=Content-Type:In-Reply-To:From:References:CC:To :Subject:MIME-Version:Date:Message-ID:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=afZ1rzC+Bi20p4YkzED21NKAaGhbZ5x7LoTYxdQ7JA8=; b=H/Y9K+evHaHO+Yb2hhFWzWwlik lIjfEkE0ZbMHKP7i1rZbJuZCccYmGq5HnKls5dtN6CLDCoTdhiH9NruD2b2RKd3UrEqCGElAmsEEf 82Q6w6q/Ap5sj369hjdsbqmqgDAnayKsOXwbrEU31DAmKk4KACWGGfh7PO8iYLmRkqbXGkd9X/jou KRiompoXLXFqkUC6hf8mvqMOhkfJgdyHAmQRnu8gMIcMevVus+M85keqjBS2JZJu4BZsjXEBjy2sP 3gO59FDoZYHI6aJBvB1YTTtOJz6mghHQhJ7QnQ7J/61QaBB9Rn9/HpeTRGDjiZ+EMBj+oDPYwxJ14 dpi8CaQA==;
Received: from msx-t422.msx.ad.zih.tu-dresden.de ([172.26.35.139] helo=msx.tu-dresden.de) by mailout3.zih.tu-dresden.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <muhammad_usama.sardar@tu-dresden.de>) id 1wA8g6-005HyR-45; Tue, 07 Apr 2026 17:49:23 +0200
Received: from [10.12.5.228] (141.76.13.165) by msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.37; Tue, 7 Apr 2026 17:49:21 +0200
Message-ID: <846bcb58-f66c-4f7d-996d-dca2bb1837d5@tu-dresden.de>
Date: Tue, 07 Apr 2026 17:49:20 +0200
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
To: "tls@ietf.org" <tls@ietf.org>
References: <CAF8qwaBcotZqOnY2qJ6d0fRoa=5v0sZTOSWqeqkou+bLJcy9LA@mail.gmail.com> <CABcZeBPr+WeivTWpSCVC4f95fRuSiOytvvBPB_6r+af9Didhgw@mail.gmail.com> <CEB84168-5998-432A-9D62-36E28B9CDFA5@vigilsec.com> <CABcZeBM-eoqh+kJ7H6SiwC9p4tKAt+YiQhzetJZJmPNpXc+5OA@mail.gmail.com> <CAF8qwaALDXR6d=jLD46wXmKHDjyj=OdJ1X3a1AgxF+ByQceeMg@mail.gmail.com> <697d6134-0083-4933-8531-9be49118be7d@cs.tcd.ie> <adCCIZsvHqgci5LT@chardros.imrryr.org> <597455e4-29e1-46a0-a9a7-b87c5adbaec7@cs.tcd.ie> <adFBMGhVMOl2eptE@chardros.imrryr.org> <34c6c882-4cef-4350-9afa-0edb0b460eb6@cs.tcd.ie> <adHR1YEW-mPEb_BT@chardros.imrryr.org> <MEAPR01MB36540326A63FD5EAB70F652BEE5CA@MEAPR01MB3654.ausprd01.prod.outlook.com> <CAPxHsS+fv2S_Ydub24AHnFJUESxkr=h1me5NEtdsZ4bCqAip-Q@mail.gmail.com> <5b703cb2-721b-485c-963a-c6661b40c4c8@tu-dresden.de> <CAPxHsSLdspKfUsnewD03ez0x-bN-DXFY_zu=yuzzkTq9M=i1Ew@mail.gmail.com>
Content-Language: en-US
From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
In-Reply-To: <CAPxHsSLdspKfUsnewD03ez0x-bN-DXFY_zu=yuzzkTq9M=i1Ew@mail.gmail.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms060406090600050703010502"
X-ClientProxiedBy: msx-t420.msx.ad.zih.tu-dresden.de (172.26.35.137) To msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139)
X-TUD-Virus-Scanned: mailout3.zih.tu-dresden.de
Message-ID-Hash: J2TG2JGGLB4KRATOFGKNR5ZHMMU6UT23
X-Message-ID-Hash: J2TG2JGGLB4KRATOFGKNR5ZHMMU6UT23
X-MailFrom: muhammad_usama.sardar@tu-dresden.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Peter Gutmann <pgut001=40cs.auckland.ac.nz@dmarc.ietf.org>, Daniel Apon <dapon.crypto@gmail.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: New Liaison Statement, "Liaison communication to IETF regarding draft-ietf-tls-mlkem"
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/yvRIXNJefxX39-bthiqFUE1bNwQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

[ # include <Ekr's apology boilerplate for nitpicking [6] > ]

I really appreciate Daniel retracting his statement that "IEEE is asking 
TLS WG to 'please hurry up'".

I am in full agreement with Ekr on his responses [6] to Daniel's email 
below.

FWIW, in addition to that, I personally find Daniel's other arguments 
unconvincing and increasingly off-topic. If anything, such circular 
debates only increase my already strong support for 
draft-barnes-tls-this-could-have-been-an-email.

3GPP LS that Daniel is talking about is simply a draft. IIUC (John, 
please correct me if I am wrong) it doesn't yet have a consensus in 3GPP 
and is still to be discussed in the next meeting. Let's not speculate 
and discuss that when that has an agreement in 3GPP and received in the 
TLS WG. Please don't put undue pressure on the WG. Everyone is a 
volunteer here.

Contrary to the argument of Google's 2029 -- that's being used to create 
urgency -- Google is actually currently recommending hybrids (with "some 
caveats" which I am looking forward to). Google blog post [7] -- which 
is mentioned in Google's 2029 timeline post [8] -- actually states:

     > While the currently proposed PQC algorithms have received a lot
    of cryptanalysis over the last decade, they are still somewhat less
    mature than classical cryptography, and our recommendation is to use
    them in a hybrid fashion, which requires an attacker to break both
    the classical and the post-quantum algorithm. There are some caveats
    on this topic that we will explore in a future blog post.

IIUC Sophie -- one of the authors of both posts [7,8] -- is a strong 
proponent of non-hybrid but that is not the current official position of 
Google, as evidenced by the above statement from [7]. If that is not 
correct, it would be helpful for Google to send IETF a LS explaining 
precisely its official position. For example, does it actually mean 
migrating fully to pure ML-KEM (or PQC in general) by 2029? Until then, 
I would encourage the WG to continue its due diligence on the 
substantial concerns raised by a couple dozen folks in the WGLC and 
avoid inferring urgency without clear technical justification. In the 
LS, Google should also explain why it needs a RFC and why the codepoints 
are insufficient?

FWIW, I want to enlist my points to which I believe Daniel has provided 
no substantive response:

 1. Explain genuine urgency for pure ML-KEM
 2. Proof that pure ML-KEM is more secure than hybrid in TLS
 3. Technical rationale for pure ML-KEM in TLS for IEEE 802.11bt project
 4. Technical relevance of Google's 2029 to IEEE 802.11 LS
 5. Why is this problematic for IEEE to publish this draft? That seems
    like a win-win for everyone while also saving everyone's time.
 6. Evidence of "international consensus" on use of pure ML-KEM within
    the TLS protocol

I would appreciate precise and concise technical responses to those 
points. Thank you!

Also, see inline:

On 07.04.26 03:26, Daniel Apon wrote:
> "On 06.04.26 02:16, Daniel Apon wrote:
>
>     Also, I suppose "the middle distance" is Google's 2029 deadline now.
>
> [Usama wrote:] That seems a little off-topic. Google's 2029 deadline 
> is an internal corporate roadmap and does not seem technically 
> relevant to this LS or the IEEE 802.11bt project."
>
>
> It is fairly significant in the real world, and therefore, I believe, 
> on-topic: Google's adoption of this or that cryptographic technology 
> influences an immense & overwhelming amount of Internet traffic.
> Indeed, when Google swapped to ECC by default in 2013, it constituted 
> something like 80%+ of the global adoption of ECC as a cryptographic 
> technology (over, previously, RSA).
Seems increasingly off-topic. See note on Google in the beginning.
>
> Continuing, Usama writes:
>
> "IEEE 802.11bt project mentioned in the LS states
>
>     As an example, the United States National Institute of Science and
>     Technology (NIST) will disallow use of key establishment and
>     digital signatures based on classic cryptography for use in US
>     government systems after 2035.
>
> Motion TGbt-M-16 [4] that is approved at IEEE 802.11 and that resulted 
> in this LS also has no such urgency as Google's 2029. As noted in [ 
> https://www.ieee802.org/11/Reports/tgbt_update.htm ], the relevant 
> regulatory deadline (NIST) is 2035."
>
>
> Well, first, NIST's instruction was written before the recent advances 
> by Google Research.
>
Thank you, but I don't see any relevance. For IEEE 802.11 LS -- the 
topic at hand in this thread -- [3] directly quotes the 2035 deadline. 
Let's not speculate and discuss it when IEEE 802.11 changes that.

>
> More to the essence of my reply, there are two points I'd like to make.
>
> First, Usama writes:
>
> " I sense no urgency in the LS. A publication within two years seems 
> aligned with their timeline [ 
> https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx 
> ]."
>
> Indeed, it seems that IEEE 802.11 has set approximately two years for 
> their closing (as of their November 2025 document here).
>
While this specific slide in [5] states November 2025 (which seems like 
typo; maybe they copied slide from November and forgot to update 
month/year), reading just the file name tells me that it is March 2026 
report, and hence updated based on the March 2026 meeting. I may be 
missing some IEEE specifics here, and Russ can correct me if I am wrong 
but that's what I understand.
>
> It seems what I was referencing was, in fact, John Preuß Mattsson's 
> comment about 
> https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_127_Malta/Docs/S3-261117.zip 
> from 3GPP TSG-SA3 earlier in this thread.
>
As mentioned in the beginning of email for 3GPP.
>
> So, I retract my statement that "IEEE is asking TLS WG to 'please 
> hurry up'"
>
Thanks very much!
>
> -- instead, it should be that 3GPP SA3 from ETSI finds relying on 
> numbered internet-drafts insufficient in place of an RFC.
>
Ditto as above for 3GPP.
>
> In particular, it's a concern regarding 
> https://www.ietf.org/archive/id/draft-barnes-tls-this-could-have-been-an-email-00.txt, 
> where I happen to agree with the introduction there:
>
>  "There used to be a grand tradition of debating the merits of
>    cryptographic algorithms in the TLS working group. Over time, folks
>    realized that this was not a productive use of the WG's time.  The
>    typical TLS WG participant is not a cryptographer, and the
>    cryptographic choices of TLS users are typically dictated by other
>    factors than the opinion of the TLS WG."
>
> and yet also -- alongside 3GPP SA3 -- disagree with the conclusion 
> that RFC's ought not be published. Publishing an RFC matters; it's 
> only a real output once an RFC is finalized. (Yes, I understand other 
> points in this thread that the current discussion is on Type XYZ of an 
> RFC vs Type ABC of an RFC.)
>
I don't find any compelling reason for "disagree with the conclusion". I 
continue to strongly support 
draft-barnes-tls-this-could-have-been-an-email to save WG energies for 
useful work.
>
> That said, if the goal here is in fact to say "We'll get to a 
> pure-mlkem actual-RFC in two years, or something," (matching the IEEE 
> 802.11 timeline, let's say) then shouldn't that _explicit timeline_ 
> also be present even in an Informational RFC (or whatever Type XYZ of 
> RFC that finalizes [I'm ignoring my personal wishes here])?
>
That would become /if/ and /when/ there is (rough) /consensus/ in the 
TLS WG and more broadly in IETF to publish it. We are way far from that.
>
>
> Second/finally, Usama writes:
>
> "The topic under discussion is IEEE 802.11 LS for pure ML-KEM in the 
> TLS protocol. I think we must distinguish between algorithm 
> standardization (NIST) and protocol integration (IETF). While there is 
> support for ML-KEM as an algorithm, I am not aware of any 
> "international consensus" on its use as a pure KEM within the TLS 
> protocol. If I have missed something, please point me to any such 
> "international consensus"."
>
> I appreciate your agreement that there is international consensus for 
> ML-KEM as an algorithm.
>
The point is that international consensus does not make ML-KEM bullet-proof.
>
> However, I also believe that requiring me to further claim 
> international consensus for "pure ML-KEM" is, genuinely, a false 
> dichotomy.
>
If this is a false dichotomy, why should the IETF even discuss its 
standardization in TLS?

My point was that algorithm security and protocol integration are two 
orthogonal issues. As an example, ML-KEM could be secure, and still 
integrated in insecure way in TLS. There is a large history of protocol 
attacks that existed even when the cryptorgraphic primitives 
(algorithms) were assumed to be perfect. I invite you to check out 
[1,9-11] -- as a few examples -- and explain to me why these attacks 
exist even with perfect crypto primitives (ECDHE).

> In my own company's systems, I have situations where I'd prefer to use 
> pure ML-KEM,
>
It would be helpful for WG to contribute those "situations" to be added 
in the draft. That would actually help this draft move forward.
>
> and I have situations where I'd like to use a mix of ECC and ML-KEM. 
> Primarily, the advantage of the latter is for bandwidth savings in 
> highly signals-constrained environments.
>
Thank you. This is actually helpful. Please propose text for motivation 
in the draft.
>
> (I'm also starkly aware that ECC may be "dead" from a product 
> engineering point of view, no matter what we discuss here -- in that 
> it may take years to roll out new ECC-based products, and the lifetime 
> of such protections may be very short these days.)
>
I am not sure if this is any helpful.
>
>
> Let's be clear about where we are: We have a passed-vote for RFC on 
> hybrid-TLS. Recently, we have, approximately, a couple dozen votes to 
> advance pure ML-KEM as another option; and another couple dozen votes 
> to forbid pure ML-KEM as another option. This isn't about requiring 
> everyone to use pure ML-KEM; this is only about whether some 
> substantial approximate-half of the body politic is permitted to use 
> pure ML-KEM in the TLS protocol at all.
>
Fully agree with Ekr's response [6] on this.

In addition, equating two dozen folks simply stating 'I support 
publication' is not the same as the two dozen folks highlighting 
significantly substantial concerns in full detail (such as [12]).

>
> Moreover, as I hinted at above, it should be clear that -- eventually 
> -- pure ML-KEM /will/ be the only viable choice (sans some kind of 
> longer-term additional international consensus about a new PQ-KEM 
> algorithm standard, which seems very far from coming). So, it's not 
> even a question -- currently -- of whether pure ML-KEM will or won't 
> be standardized; it can only be a question of /when/ pure ML-KEM will 
> be standardized for use in TLS.
>
Fully agree with Ekr's response [6] on this.

Moreover, it's not at all clear to me why one would do a security 
regression in TLS from hybrids for apparently a very small one-time 
setup performance impact.

>
> So the basic framing of this question /should/ be: Are all products 
> and companies and implementations /required/ to support only 
> hybrid-mode TLS now, and also /required/ to perform a second 
> large-scale engineering effort to migrate to pure ML-KEM sometime 
> later (whenever that happens; and bless everyone for having the energy 
> to restart the conversation in two years or whenever); _OR_, is it 
> acceptable for early-movers to adopt a purely quantum-resistant 
> solution now, and offer it (optionally) to connections that accept 
> that algorithm suite during TLS negotiation?
>
Fully agree with Ekr's response [6] on this.

Best regards,

-Usama

>     [0] https://github.com/CCC-Attestation/formal-spec-id-crisis
>
>     [1]
>     https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/
>
>     [2]
>     https://mentor.ieee.org/802.11/dcn/26/11-26-0652-00-00bt-ietf-request-for-pure-ml-kem-liaison.pptx
>     (Slide 2,3)
>
>     [3] https://www.ieee802.org/11/Reports/tgbt_update.htm
>
>     [4]
>     https://mentor.ieee.org/802.11/dcn/26/11-26-0299-00bt-tgbt-agenda-2026-march-plenary.pptx
>     (Slide 25)
>
>     [5]
>     https://mentor.ieee.org/802.11/dcn/26/11-26-0683-00bt-tgbt-march-2026-closing-report.pptx
>     (Slide 6)
>
[6] https://mailarchive.ietf.org/arch/msg/tls/EmVFQEmhoXKsK5E3B6X5nIHPQPg/

[7] 
https://bughunters.google.com/blog/googles-threat-model-for-post-quantum-cryptography

[8] 
https://blog.google/innovation-and-ai/technology/safety-security/cryptography-migration-timeline/

[9] 
https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS

[10] 
https://github.com/ultravioletrs/cocos/security/advisories/GHSA-vfgg-mvxx-mgg7

[11] https://nvd.nist.gov/vuln/detail/CVE-2026-33697

[12] https://mailarchive.ietf.org/arch/msg/tls/jlsYHENwqMv-4XPRvunqKsAL36k/