On Mon, Mar 18, 2024 at 3:37 PM 'David Adrian' via blink-dev < blink-dev@chromium.org> wrote:
> Contact emailsdadr...@google.com > > Explainer > https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html > > Specification > https://www.ietf.org/archive/id/draft-tls-westerbaan-xyber768d00-02.html > > Summary > > Protect current Chrome TLS traffic against future quantum cryptanalysis by > deploying the Kyber768 quantum-resistant key agreement algorithm. This is a > hybrid X25519 + Kyber768 key agreement based on an IETF standard. This > specification and launch is outside the scope of W3C. This key agreement > will be launched as a TLS cipher, and should be transparent to users. > https://blog.chromium.org/2023/08/protecting-chrome-traffic-with-hybrid.html > > > Blink componentInternals>Network>SSL > <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL> > > Search tagstls <https://chromestatus.com/features#tags:tls>, kem > <https://chromestatus.com/features#tags:kem>, kyber > <https://chromestatus.com/features#tags:kyber>, postquantum > <https://chromestatus.com/features#tags:postquantum> > > TAG review > > TAG review statusNot applicable > > Risks > > > Interoperability and Compatibility > > Post-quantum secure ciphers are larger than classical ciphers. This may > cause compatibility issues with middleboxes. > I'm guessing we're talking about MITM middleboxes, is that correct? What's our plan to mitigate that risk? Slow rollout? Enterprise policy? Both? Something else entirely? > > > *Gecko*: Shipped/Shipping ( > https://github.com/mozilla/standards-positions/issues/874) Firefox is > also in the process of rolling this out. > > *WebKit*: No signal ( > https://github.com/WebKit/standards-positions/issues/244) > > *Web developers*: No signals > > *Other signals*: > > WebView application risks > > Does this intent deprecate or change behavior of existing APIs, such that > it has potentially high risk for Android WebView-based applications? > > > > Debuggability > > > > Will this feature be supported on all six Blink platforms (Windows, Mac, > Linux, ChromeOS, Android, and Android WebView)?Yes > > Is this feature fully tested by web-platform-tests > <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> > ?N/A > > Flag name on chrome://flagsenable-tls13-kyber > > Finch feature namePostQuantumKyber > > Requires code in //chrome?False > > Tracking bughttps://bugs.chromium.org/p/chromium/issues/detail?id=1442377 > > Launch bughttps://launch.corp.google.com/launch/4252981 > > Estimated milestones > Shipping on desktop 124 > Origin trial desktop first 118 > Origin trial desktop last 123 > DevTrial on desktop 115 > Shipping on Android 128 > OriginTrial Android last 128 > OriginTrial Android first 118 > DevTrial on Android 115 > Shipping on WebView 128 > OriginTrial webView last 128 > OriginTrial webView first 118 > > Link to entry on the Chrome Platform Status > https://chromestatus.com/feature/5257822742249472 > > Links to previous Intent discussionsIntent to prototype: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2BgKeCTA6vWwzrE%3DDVR%3DTmQaCyDFQxqnXkOy9GcVyGtnA%40mail.gmail.com > Intent > to Experiment: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42%2B37SpGUy9t6bBkP13XQL4mrEaY%2Bu0wAzttjZyr_f2rGA%40mail.gmail.com > > We plan to ship Kyber (ML-KEM) by default on *desktop platforms only* starting > in M124. Kyber is a quantum-resistant key exchange mechanism for TLS that > defends against harvest-now-decrypt-later > <https://bughunters.google.com/blog/5108747984306176/google-s-threat-model-for-post-quantum-cryptography> > attacks. This risk is relevant even if quantum computers do not yet exist. > > Due to the structure of TLS 1.3, Kyber key shares are sent on the first > ClientHello message regardless of server support. Servers that do not yet > support Kyber will ignore it, and select a different algorithm. Servers > that do support Kyber, such as GFEs and Cloudflare, will select Kyber and > respond with their own Kyber key encapsulation. > > Unfortunately, Kyber key shares are around 35x larger than an X25519 key > exchange, which increases the latency of the TLS handshake connections by > 4-6%. On Desktop platforms, this effect is largely in the noise due to the > higher likelihood of a high-bandwidth low-latency connection, and > connection pooling reuse (one TLS handshake, many HTTP requests). On > Android, this effect is far more noticeable and results in measurable > regressions in LCP. > > Therefore, we intend to ship Kyber by default on Desktop platforms while > we come up with a broader strategy for when and how to ship post-quantum > cryptography on Android. > > N.B. This Chrome Status entry is old and predates the new approval system > from summer 2023. > > > This intent message was generated by Chrome Platform Status > <https://chromestatus.com/>. > > -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42K4xE5n_Fbt8heqhNMC7-xf3RhNVopguK3YeTVoYM-VzQ%40mail.gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42K4xE5n_Fbt8heqhNMC7-xf3RhNVopguK3YeTVoYM-VzQ%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohS%2BQfNtLkMRmf1o9-1GtVrDh6R2b_ugJeVNvjAQULPsTRA%40mail.gmail.com.