[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-23 Thread Joseph Birr-Pixton
On Fri, 18 Oct 2024 at 15:12, Salz, Rich wrote: > To me, this trumps geek esthetics about making things line up. > To be clear, my objection is not aesthetic or even about implementation effort. My concern is about rubber-stamping whatever unprincipled things that NIST comes up with. I also agr

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-23 Thread Dang, Quynh H. (Fed)
h as "c ap traffic" and the transcript. When we have a decision on this matter, our team will share it with you. Regards, Quynh. From: David Benjamin Sent: Wednesday, October 23, 2024 11:52 AM To: Joseph Birr-Pixton Cc: Salz, Rich ; John Mattsson ; tls@ietf.org Subject: [TLS] Re:

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-23 Thread David Benjamin
Oh I definitely agree there is a deeper problem here. It seems like NIST wrote something over-restrictive and then folks did a preemptive compliance maneuver to try to satisfy it. This is not a good way to do protocol development and hampers what should ultimately have been the goal for everyone: m

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-23 Thread Christopher Wood
I agree. X25518MLKEM768 has shipped, so we should just leave it alone.Best,Chris On Oct 17, 2024, at 11:38 AM, David Benjamin wrote:Specifically the X25519MLKEM768 is widely deployed already. I'm not aware of any deployments of the other hybrids. I am very strongly opposed to incompatible changes

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-18 Thread Salz, Rich
> There will need to be key exchange groups that are FIPS compatible, so either it will happen in this i-d, or a new one will be published. > I'm of the opinion that it's better to have fewer codepoints to test interoperability of. > Especially if the change is completely inconsequential to peopl

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-18 Thread Alicja Kario
On Thursday, 17 October 2024 18:31:05 CEST, John Mattsson wrote: We should have a consistent ordering of [EC, PQ] in both the names and the key schedule. I.e., the code should be >consistent with the naming and either the EC or the PQC ought to always come first. +1 (if FIPS leads to weird

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-18 Thread John Mattsson
LS List Subject: [TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02 Just to clarify Kris, you are _asking_ if there is a plan? I don't know if Quynh can comment but Yes, I was wondering if there is a concrete plan to relax the ordering requirement. After yesterday's me

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-18 Thread Stephen Farrell
Hiya, On 10/17/24 16:37, David Benjamin wrote: Specifically the X25519MLKEM768 is widely deployed already. I'm not aware of any deployments of the other hybrids. I am very strongly opposed to incompatible changes to the widely deployed one for something this trivial and unimportant. +1 S. _

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-18 Thread Kris Kwiatkowski
Just to clarify Kris, you are _asking_ if there is a plan? I don't know if Quynh can comment but Yes, I was wondering if there is a concrete plan to relax the ordering requirement. After yesterday's meeting, I understood that this is something NIST may consider. [1] See Mike's notes https://ma

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Watson Ladd
On Thu, Oct 17, 2024 at 8:36 AM Salz, Rich wrote: > > * We should have a consistent ordering of [EC, PQ] in both the names and the > key schedule. I.e., the code should be consistent with the naming and either > the EC or the PQC ought to always come first. > > > > That would be nice, but it app

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Tim Hollebeek
+1 to choosing reasonable and consistent names that make sense, instead of being overly concerned with whether they exactly replicate the implementation. -Tim From: David Benjamin Sent: Thursday, October 17, 2024 11:33 AM To: Subject: [TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Geert Hendrickx
On Thu, Oct 17, 2024 at 15:36:02 +, Salz, Rich wrote: > * Can we please have a separator between them, as in MLKEM768_X25519? > > Yes please! I would also like to suggest a capitalisation consistent with existing IANA groups: x25519_mlkem768 and secp256r1_mlkem768 (or perhaps secp256r1_MLKE

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread John Mattsson
>We should have a consistent ordering of [EC, PQ] in both the names and the key >schedule. I.e., the code should be >consistent with the naming and either the >EC or the PQC ought to always come first. +1 (if FIPS leads to weird solutions, I think IETF should ignore FIPS for one of them) _

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread David Benjamin
Specifically the X25519MLKEM768 is widely deployed already. I'm not aware of any deployments of the other hybrids. I am very strongly opposed to incompatible changes to the widely deployed one for something this trivial and unimportant. I am not personally opposed to changes to the others if the W

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Salz, Rich
* We should have a consistent ordering of [EC, PQ] in both the names and the key schedule. I.e., the code should be consistent with the naming and either the EC or the PQC ought to always come first. That would be nice, but it appears that the requirements that some find important (e.g., for me

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread David Benjamin
While this whole situation is indeed ridiculous (there is obviously no security reason to use one or the other order and any certification systems that believe otherwise are clearly wrong and should be fixed), this draft with this order is now running code in several large deployments. I don't thin

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Eric Rescorla
My $.02. * We should have a consistent ordering of [EC, PQ] in both the names and the key schedule. I.e., the code should be consistent with the naming and either the EC or the PQC ought to always come first. * I don't have a strong opinion about which should go first. * Can we please have a separ

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Jan Schaumann
Bas Westerbaan wrote: > The number of people that actually implement these hybrid KEMs is much > smaller than the number of people that need to make a choice based on their > name. How do we explain that one is called MLKEM768X25519 and the other > SecP256r1MLKEM768? "In hybrid key exchanges, the

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Dang, Quynh H. (Fed)
, October 17, 2024 9:24 AM To: Kris Kwiatkowski Cc: CJ Tjhai ; draft-kwiatkowski-tls-ecdhe-mlkem.auth...@ietf.org; TLS List Subject: [TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02 Just to clarify Kris, you are _asking_ if there is a plan? I don't know if Quynh can commen

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Deirdre Connolly
Just to clarify Kris, you are _asking_ if there is a plan? I don't know if Quynh can comment but NIST have said publicly that they plan to clarify hybrid KEMs in the forthcoming SP 800-227: https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/6_D0mMSYJZY/m/3DwwIAJXAwAJ > is there a plan to cha

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Deirdre Connolly
It would in fact be great to get an official answer on whether either order is FIPS-compatible, as it clear that the order doesn't matter for security when used in TLS 1.3 as written in tls-hybrid-design (fixed lengths, everything public is going into the key schedule anyway, etc). There are other

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Dang, Quynh H. (Fed)
. From: Eric Rescorla Sent: Thursday, October 17, 2024 8:54 AM To: Joseph Birr-Pixton Cc: CJ Tjhai ; draft-kwiatkowski-tls-ecdhe-mlkem.auth...@ietf.org; TLS List Subject: [TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02 Can we get a ruling on this from NIST? Quynh? -Ekr On Thu

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Deirdre Connolly
So it's pretty clear that TLS 1.3 is FIPS-able, because it has been validated multiple times. But it's not just a blessed exception, or that FIPS is 'not sensitive' to the particulars - it looks to be using HKDF in compliance with SP 800-133rev2 (Section 6.3 Option #3), SP 800-56Crev2, and SP 800-1

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Kris Kwiatkowski
Indeed, that would be good inside. Additionally, is there a plan to change SP800-56Cr2, so that it allows to use combination of two shared secrets where one was generated by FIPS-approved technique, BUT concatenated in any order. I understand it is potentially more complicated for ACVP testing,

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Eric Rescorla
Can we get a ruling on this from NIST? Quynh? -Ekr On Thu, Oct 17, 2024 at 2:32 AM Joseph Birr-Pixton wrote: > Please could we... not? > > It certainly is one interpretation of that section in SP800-56C. Another > is that TLS1.3 falls outside SP800-56C, because while HKDF kinda looks like > se

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Kris Kwiatkowski
certified SecP2561r1 crypto backend and not yet certified MLKEM? This is precisely the problem we want to address with P-256. ___ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Yaroslav Rosomakho
Any reason why we won’t put MLKEM in front of ECDHE key share for all the curves both on the wire and in the naming convention?That would be consistent and harder to get wrong.Or would this make an implementation of hybrid MLKEM and SecP256r1 non FIPS certified in the case of using certified SecP25

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Joseph Birr-Pixton
Please could we... not? It certainly is one interpretation of that section in SP800-56C. Another is that TLS1.3 falls outside SP800-56C, because while HKDF kinda looks like section 5, none of the allowed options for key expansion specified in SP800-108 (and revs) are the same as HKDF-Expand. "KDF

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Bas Westerbaan
The number of people that actually implement these hybrid KEMs is much smaller than the number of people that need to make a choice based on their name. How do we explain that one is called MLKEM768X25519 and the other SecP256r1MLKEM768? That'll cause more confusion worldwide over the coming decade

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread CJ Tjhai
Personally, I prefer a name change to MLKEM768X25519. Cheers, CJ On Thu, 17 Oct 2024 at 08:57, Kris Kwiatkowski wrote: > Yes, we switched the order. We want MLKEM before X25519, as that > presumably can be FIPS-certified. > According to > https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NI

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Kris Kwiatkowski
Yes, we switched the order. We want MLKEM before X25519, as that presumably can be FIPS-certified. According to https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Cr2.pdf, section 2, the shared secret from the FIPS-approved algorithm must precede the one that is not approved. X

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Watson Ladd
Did we really switch the order gratuitously on the wire between them? On Thu, Oct 17, 2024 at 12:02 AM CJ Tjhai wrote: > > Hello, > > The X25519MLKEM768 scheme defined in the document is a concatenation of > MLKEM768 and X25519, why is it not named MLKEM768X25519 instead? > > For SecP256r1MLKEM7