Contact emailsdadr...@google.com

Explainer
https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html

Specification
https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html

Summary

Protect current Chrome TLS traffic against future quantum cryptanalysis by
deploying the Kyber768 quantum-resistant key agreement algorithm. This is a
hybrid X25519 + Kyber768 key agreement based on an IETF standard. This
specification and launch is outside the scope of W3C. This key agreement
will be launched as a TLS cipher, and should be transparent to users.
https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html


Blink componentInternals>Network>SSL
<https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>

Search tagstls <https://chromestatus.com/features#tags:tls>, kem
<https://chromestatus.com/features#tags:kem>, kyber
<https://chromestatus.com/features#tags:kyber>, postquantum
<https://chromestatus.com/features#tags:postquantum>

TAG review

TAG review statusNot applicable

Risks


Interoperability and Compatibility

Post-quantum secure ciphers are larger than classical ciphers. This may
cause compatibility issues with middleboxes.


*Gecko*: Shipped/Shipping (
https://github.com/mozilla/standards-positions/issues/874) Firefox is also
in the process of rolling this out.

*WebKit*: No signal (
https://github.com/WebKit/standards-positions/issues/244)

*Web developers*: No signals

*Other signals*:

WebView application risks

Does this intent deprecate or change behavior of existing APIs, such that
it has potentially high risk for Android WebView-based applications?



Debuggability



Will this feature be supported on all six Blink platforms (Windows, Mac,
Linux, ChromeOS, Android, and Android WebView)?Yes

Is this feature fully tested by web-platform-tests
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
?N/A

Flag name on chrome://flagsenable-tls13-kyber

Finch feature namePostQuantumKyber

Requires code in //chrome?False

Tracking bughttps://bugs.chromium.org/p/chromium/issues/detail?id=1442377

Launch bughttps://launch.corp.google.com/launch/4252981

Estimated milestones
Shipping on desktop 124
Origin trial desktop first 118
Origin trial desktop last 123
DevTrial on desktop 115
Shipping on Android 128
OriginTrial Android last 128
OriginTrial Android first 118
DevTrial on Android 115
Shipping on WebView 128
OriginTrial webView last 128
OriginTrial webView first 118

Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5257822742249472

Links to previous Intent discussionsIntent to prototype:
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BgKeCTA6vWwzrE%3DDVR%3DTmQaCyDFQxqnXkOy9GcVyGtnA%40mail.gmail.com
Intent
to Experiment:
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2B37SpGUy9t6bBkP13XQL4mrEaY%2Bu0wAzttjZyr_f2rGA%40mail.gmail.com

We plan to ship Kyber (ML-KEM) by default on *desktop platforms only* starting
in M124. Kyber is a quantum-resistant key exchange mechanism for TLS that
defends against harvest-now-decrypt-later
<https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography>
attacks. This risk is relevant even if quantum computers do not yet exist.

Due to the structure of TLS 1.3, Kyber key shares are sent on the first
ClientHello message regardless of server support. Servers that do not yet
support Kyber will ignore it, and select a different algorithm. Servers
that do support Kyber, such as GFEs and Cloudflare, will select Kyber and
respond with their own Kyber key encapsulation.

Unfortunately, Kyber key shares are around 35x larger than an X25519 key
exchange, which increases the latency of the TLS handshake connections by
4-6%. On Desktop platforms, this effect is largely in the noise due to the
higher likelihood of a high-bandwidth low-latency connection, and
connection pooling reuse (one TLS handshake, many HTTP requests). On
Android, this effect is far more noticeable and results in measurable
regressions in LCP.

Therefore, we intend to ship Kyber by default on Desktop platforms while we
come up with a broader strategy for when and how to ship post-quantum
cryptography on Android.

N.B. This Chrome Status entry is old and predates the new approval system
from summer 2023.


This intent message was generated by Chrome Platform Status
<https://chromestatus.com/>.

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42K4xE5n_Fbt8heqhNMC7-xf3RhNVopguK3YeTVoYM-VzQ%40mail.gmail.com.

Reply via email to