[TLS] DSA support in TLS 1.3.

2015-08-28 Thread Dang, Quynh
Hi all, DSA is supported in the previous versions of TLS. It would be nice if someone who uses DSA can use it in TLS 1.3 as well. People who don't use DSA, then they don't use DSA. People who use DSA right, it should be fine for them to use DSA. I don't see a convincing reason to remove sup

Re: [TLS] DSA support in TLS 1.3.

2015-08-31 Thread Dang, Quynh
laces than just public servers and common browsers. For the people who use DSA in TLSs, it would be nice if they could run TLS 1.3 with DSA if they choose to do so. Quynh. From: TLS on behalf of Dang, Quynh Sent: Friday, August 28, 2015 3:17 PM To: e..

Re: [TLS] DSA support in TLS 1.3.

2015-09-04 Thread Dang, Quynh
Hi IIari, >From all of the RFCs about suite B that I have read, DSA has never been a part >of it. RSA can be used for signatures and key wrap/transport. Quynh. From: TLS on behalf of Ilari Liusvaara Sent: Wednesday, September 2, 2015 1:49 PM To: Sal

Re: [TLS] '15 TLS Fall Interim Minutes

2015-09-23 Thread Dang, Quynh
I am just curious why we need the content type here? Quynh. From: TLS on behalf of Dave Garrett Sent: Tuesday, September 22, 2015 7:45 PM To: Sean Turner Cc: tls@ietf.org Subject: Re: [TLS] '15 TLS Fall Interim Minutes On Tuesday, September 22, 2015 0

Re: [TLS] Encrypted SNI (was: Privacy considerations - identity hiding from eavesdropping in (D)TLS)

2015-09-25 Thread Dang, Quynh
How about making fixed length(s) for each message type, then pad it with 0x01 then optional 0x00s? Quynh. From: TLS on behalf of Dave Garrett Sent: Friday, September 25, 2015 2:11 PM To: tls@ietf.org; m...@sap.com Subject: Re: [TLS] Encrypted SNI (was

[TLS] Collision issue in ciphertexts.

2015-11-01 Thread Dang, Quynh
Hi Eric, As you asked the question about how many ciphertext blocks should be safe under a single key, I think it is safe to have 2^96 blocks under a given key if the IV (counter) is 96 bits. When there is a collision between two ciphertext blocks when two different counter values are used ,

Re: [TLS] [Cfrg] Collision issue in ciphertexts.

2015-11-02 Thread Dang, Quynh
Cs I generated before are useless now. From: Watson Ladd Sent: Monday, November 2, 2015 5:07 AM To: Dang, Quynh Cc: tls@ietf.org; c...@ietf.org; Eric Rescorla Subject: Re: [Cfrg] Collision issue in ciphertexts. On Nov 2, 2015 2:14 AM, "Dang, Quynh"

[TLS] Data limit for GCM under a given key.

2015-11-04 Thread Dang, Quynh
authentication. However, rekeying often is a good thing which could help prevent disaster to keep go on if there is something wrong with the IV or the key. Quynh. From: Dang, Quynh Sent: Monday, November 2, 2015 3:00 PM To: Watson Ladd Cc: tls@ietf.org; c...@ietf.org

Re: [TLS] Data limit for GCM under a given key.

2015-11-04 Thread Dang, Quynh
I did not talk under indistinguishability framework. My discussion was about confidentiality protection and authentication. Quynh. From: Watson Ladd Sent: Wednesday, November 4, 2015 3:17:00 PM To: Dang, Quynh Cc: Eric Rescorla; tls@ietf.org Subject: Re

Re: [TLS] Data limit for GCM under a given key.

2015-11-06 Thread Dang, Quynh
. From: Tony Arcieri Sent: Friday, November 6, 2015 7:59 PM To: Watson Ladd Cc: Dang, Quynh; tls@ietf.org Subject: Re: [TLS] Data limit for GCM under a given key. On Friday, November 6, 2015, Watson Ladd mailto:watsonbl...@gmail.com>> wrote: On Wed, Nov 4, 2015 at 3:43 PM, Dang, Quynh wrote: &

Re: [TLS] Data volume limits

2015-12-16 Thread Dang, Quynh
Hi Eric, I explained the issue before and some other people recently explained it again on this thread. AES has 128-bit block. Therefore, when there are 2^64 or more ciphertext blocks, there are likely collisions among the ciphertext blocks (the collision probability increases rapidly when th

Re: [TLS] Data volume limits

2015-12-18 Thread Dang, Quynh
The collision probability of ciphertext blocks also depends on the size of the plaintext (record size in a TLS implementation) in each call of the GCM encryption function. Let's call each plaintext to be 2^x 128-bit blocks. TLS 1.3 uses 96-bit IV. If someone wants the collision probability

Re: [TLS] Data volume limits

2015-12-29 Thread Dang, Quynh
. From: TLS on behalf of Dang, Quynh Sent: Friday, December 18, 2015 10:49 AM To: tls@ietf.org Subject: Re: [TLS] Data volume limits The collision probability of ciphertext blocks also depends on the size of the plaintext (record size in a TLS

Re: [TLS] RSA-PSS in TLS 1.3

2016-03-03 Thread Dang, Quynh (Fed)
Hi all, Why don't we use an even more elegant RSA signature called " full-domain hash RSA signature" ? As you know, a SHAKE (as a variable output-length hash function) naturally produces a hash value which fits any given modulus size. Therefore, no paddings are needed which avoids any potentia

Re: [TLS] RSA-PSS in TLS 1.3

2016-03-03 Thread Dang, Quynh (Fed)
AM To: tls@ietf.org Subject: Re: [TLS] RSA-PSS in TLS 1.3 On Thu, 3 Mar 2016 13:35:46 + "Dang, Quynh (Fed)" wrote: > Why don't we use an even more elegant RSA signature called " > full-domain hash RSA signature" ? Full Domain Hashing was originally developed

Re: [TLS] RSA-PSS in TLS 1.3

2016-03-03 Thread Dang, Quynh (Fed)
PSS+SHAKE128/512+SHAKE128 or PSS+SHAKE256/512+SHAKE256 (as SHAKEs being used as MGF) would be more efficient options. NIST is working on a formal specification for the SHAKEs being used as fixed output-length hash functions such as SHAKE128/256, SHAKE128/512 and SHAKE256/512. Prepending a rand

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-03-31 Thread Dang, Quynh (Fed)
Hi Sean and all, I support the first condition: A spec gets a "Y" when it has the IETF consensus. Regards, Quynh. From: TLS on behalf of Hannes Tschofenig Sent: Thursday, March 31, 2016 9:45 AM To: Sean Turner; Subject: Re: [TLS] call for consensus:

Re: [TLS] call for consensus: changes to IANA registry rules for cipher suites

2016-04-06 Thread Dang, Quynh (Fed)
Hi Sean, I would like to express my opinion again. I think the first requirement is great and sufficient. I have great support, appreciation and respect for the open source communities. However, the second requirement means that an IETF consensus can have no values in theory and that sounds n

Re: [TLS] Alexey Melnikov's Yes on draft-ietf-tls-chacha20-poly1305-04: (with COMMENT)

2016-05-05 Thread Dang, Quynh (Fed)
Hi Stephen, The one below can be used. [FIPS 180-4] Federal Information Processing Standards Publication (FIPS PUB) 180-4, Secure Hash Standard (SHS), August 2015. Regards, Quynh. From: TLS on behalf of Stephen Farrell Sent: Thursday,

[TLS] Comments on nonce construction and cipher text size restriction.

2016-05-24 Thread Dang, Quynh (Fed)
Hi Eric, 1. For this text: "plus the length of the output of the signing algorithm. " in the last paragraph of Section 4.8.1, did you mean "plus the output of the signing algorithm." ? 2. "The length (in bytes) of the following TLSCiphertext.fragment. The length MUST NOT exceed 2^14 + 256. An

Re: [TLS] Comments on nonce construction and cipher text size restriction.

2016-05-24 Thread Dang, Quynh (Fed)
On 5/24/16, 12:13 PM, "Martin Thomson" wrote: >On 24 May 2016 at 08:20, Dang, Quynh (Fed) wrote: >> 1. For this text: "plus the length of the output of the signing >>algorithm. >> " in the last paragraph of Section 4.8.1, did you mean "plus the o

Re: [TLS] Comments on nonce construction and cipher text size restriction.

2016-05-24 Thread Dang, Quynh (Fed)
On 5/24/16, 12:58 PM, "ilariliusva...@welho.com on behalf of Ilari Liusvaara" wrote: >On Tue, May 24, 2016 at 03:20:17PM +, Dang, Quynh (Fed) wrote: >> Hi Eric, >> >> 1. For this text: "plus the length of the output of the signing >> algorithm

Re: [TLS] Comments on nonce construction and cipher text size restriction.

2016-05-24 Thread Dang, Quynh (Fed)
On 5/24/16, 2:42 PM, "Martin Thomson" wrote: >On 24 May 2016 at 10:46, Dang, Quynh (Fed) wrote: >>>We discussed this at quite some length. I originally took your >>>position, but the IVs add an extra layer of safety at very little >>>cost. >>

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
Hi Eric and all, In my opinion, we should give better information about data limit for AES_GCM in TLS 1.3 instead of what is current in the draft 14. In this paper: http://www.isg.rhul.ac.uk/~kp/TLS-AEbounds.pdf, what is called confidentiality attack is the known plaintext differentiality atta

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
Hi Eric and all, In my opinion, we should give better information about data limit for AES_GCM in TLS 1.3 instead of what is current in the draft 14. In this paper: http://www.isg.rhul.ac.uk/~kp/TLS-AEbounds.pdf, what is called confidentiality attack is the known plaintext differentiality atta

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
eaking this notion does >not break confidentiality. Can you explain what you mean by >"confidentiality", in a precise way? I can then try to tell you whether >this notion will imply yours. > >Regards > >Kenny > >On 12/07/2016 14:04, "TLS on behalf of Dang, Quynh

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
>>data bytes. To come to the 2^38 record limit, they assume that each >>record is the maximum 2^14 bytes. Of course, at a 1Gbps rate, it'd take >>over a year to encrypt that much data... >> >>> -Original Message- >>> From: TLS [mailto:tls-boun

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
Hi Kenny, On 7/12/16, 1:05 PM, "Paterson, Kenny" wrote: >Hi > >On 12/07/2016 16:12, "Dang, Quynh (Fed)" wrote: > >>Hi Kenny, >> >>The indistinguishability-based security notion in the paper is a stronger >>security notion than the (old)

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
Hi Kenny, On 7/12/16, 1:39 PM, "Paterson, Kenny" wrote: >Hi > >On 12/07/2016 18:12, "Dang, Quynh (Fed)" wrote: > >>Hi Kenny, >> >>On 7/12/16, 1:05 PM, "Paterson, Kenny" wrote: >> >>>Hi >>> >>>On 12/

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-12 Thread Dang, Quynh (Fed)
the maximum 2^14 bytes. Of course, at a 1Gbps rate, it'd take >>over a year to encrypt that much data... >> >>> -Original Message- >>> From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Dang, Quynh (Fed) >>> Sent: Tuesday, July 12, 2016 11:1

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-13 Thread Dang, Quynh (Fed)
Good morning Kenny, On 7/12/16, 3:03 PM, "Paterson, Kenny" wrote: >Hi, > >> On 12 Jul 2016, at 18:56, Dang, Quynh (Fed) wrote: >> >> Hi Kenny, >> >>> On 7/12/16, 1:39 PM, "Paterson, Kenny" >>>wrote: >>> >>

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-13 Thread Dang, Quynh (Fed)
Hi Kenny, On 7/12/16, 3:03 PM, "Paterson, Kenny" wrote: >Hi, > >> On 12 Jul 2016, at 18:56, Dang, Quynh (Fed) wrote: >> >> Hi Kenny, >> >>> On 7/12/16, 1:39 PM, "Paterson, Kenny" >>>wrote: >>> >>

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-13 Thread Dang, Quynh (Fed)
, Scott Fluhrer (sfluhrer) wrote: >>> -Original Message- >>> From: Paterson, Kenny [mailto:kenny.pater...@rhul.ac.uk] >>> Sent: Tuesday, July 12, 2016 1:17 PM >>> To: Dang, Quynh (Fed); Scott Fluhrer (sfluhrer); Eric Rescorla; >>> tls@ietf.org >>> Su

Re: [TLS] New draft: draft-ietf-tls-tls13-14.txt

2016-07-13 Thread Dang, Quynh (Fed)
known plaintexts. In protocols such as TLS and Ipsec, there are known plaintexts, but I don¹t think the amount of known plaintexts (even though the amount of encrypted repeated-plaintexts can be big) is enough to create risk for AES_128 by the targeted plaintext recovery attack. A known plaintex

[TLS] Data limit to achieve Indifferentiability for ciphertext with TLS 1.3 GCM, and the 2nd paragraph of Section 5.5

2016-11-13 Thread Dang, Quynh (Fed)
Hi Eric and all, Regardless of the actual record size, each 128-bit block encryption is performed with a unique 128-bit counter which is formed by the 96-bit IV and the 32-bit counter_block value called CB in NIST SP 800-38D under a given key as long as the number of encrypted records is not mo

Re: [TLS] [Cfrg] Data limit to achieve Indifferentiability for ciphertext with TLS 1.3 GCM, and the 2nd paragraph of Section 5.5

2016-11-13 Thread Dang, Quynh (Fed)
eying too often than needed would just create more room for issues for the connection/session without gaining any additional practical security at all. Quynh. From: Martin Thomson Sent: Sunday, November 13, 2016 6:54 PM To: Dang, Quynh (Fed) Cc: e...@rtfm.

Re: [TLS] [Cfrg] Data limit to achieve Indifferentiability for ciphertext with TLS 1.3 GCM, and the 2nd paragraph of Section 5.5

2016-11-21 Thread Dang, Quynh (Fed)
Hi Ilari, You were right, for testing, a smaller number should be used. Quynh. From: ilariliusva...@welho.com on behalf of Ilari Liusvaara Sent: Monday, November 21, 2016 3:42 PM To: Dang, Quynh (Fed) Cc: Martin Thomson; tls@ietf.org; c...@ietf.org

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-10 Thread Dang, Quynh (Fed)
Hi Sean and all, I agree with everyone that the text in (b) was not very good text. The problem with (c) is that it is not precise at places and it leaves out a lot of informative discussions which users should know. The sentence "The maximum amount of plaintext data that can be safely encry

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-10 Thread Dang, Quynh (Fed)
Hi Kenny, From: TLS mailto:tls-boun...@ietf.org>> on behalf of "Paterson, Kenny" mailto:kenny.pater...@rhul.ac.uk>> Date: Friday, February 10, 2017 at 4:06 AM To: Sean Turner mailto:s...@sn3rd.com>> Cc: IRTF CFRG mailto:c...@irtf.org>>, "mailto:tls@ietf.org>>" mailto:tls@ietf.org>> Subject: Re:

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-10 Thread Dang, Quynh (Fed)
Hi Rene, From: TLS mailto:tls-boun...@ietf.org>> on behalf of Rene Struik mailto:rstruik@gmail.com>> Date: Friday, February 10, 2017 at 10:51 AM To: Sean Turner mailto:s...@sn3rd.com>>, "mailto:tls@ietf.org>>" mailto:tls@ietf.org>> Cc: IRTF CFRG mailto:c...@irtf.org>> Subject: Re: [TLS] [Cfr

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-10 Thread Dang, Quynh (Fed)
tls@ietf.org>>" mailto:tls@ietf.org>> Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769) Dear Quynh, On 10/02/2017 12:48, "Dang, Quynh (Fed)" mailto:quynh.d...@nist.gov>> wrote: Hi Kenny, Hi, My preference is to go with th

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-10 Thread Dang, Quynh (Fed)
truik Sent: Friday, February 10, 2017 2:02:14 PM To: Dang, Quynh (Fed); Sean Turner; Cc: IRTF CFRG Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769) Hi Quynh: Not sure where to start (there is vast literature on side channel attacks and other impleme

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-11 Thread Dang, Quynh (Fed)
o either measure the amount of plaintext or ciphertext. Regards, Quynh. From: Paterson, Kenny Sent: Friday, February 10, 2017 2:06:46 PM To: Dang, Quynh (Fed); Sean Turner Cc: IRTF CFRG; Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PR

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-13 Thread Dang, Quynh (Fed)
Hi Markulf, The probability of a bad thing to happen is actually below (or about) 2^(-33). It practically won’t happen when the chance is 1 in 2^32. And, to achieve that chance, you must collect 2^48 128-bit blocks. Regards, Quynh. From: TLS mailto:tls-boun...@ietf.org>> on behalf of Markulf

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-14 Thread Dang, Quynh (Fed)
Hi Markulf and all, I provided more explanation below. From: 'Quynh' mailto:quynh.d...@nist.gov>> Date: Monday, February 13, 2017 at 10:45 AM To: Markulf Kohlweiss mailto:mark...@microsoft.com>>, "Paterson, Kenny" mailto:kenny.pater...@rhul.ac.uk>>, Sean Turner mailto:s...@sn3rd.com>> Cc: Anto

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-14 Thread Dang, Quynh (Fed)
n't think point 2 is a problem because it gives people a good enough heuristic, however this can be fixed easily by minimally modifying the original text. Atul On 2017-02-14 03:59, Dang, Quynh (Fed) wrote: Hi Markulf and all, I provided more explanation below. From: 'Quynh'

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-14 Thread Dang, Quynh (Fed)
t; Regards, Quynh. ________ From: Dang, Quynh (Fed) Sent: Tuesday, February 14, 2017 1:20:12 PM To: Atul Luykx; Dang, Quynh (Fed) Cc: Markulf Kohlweiss; Antoine Delignat-Lavaud; IRTF CFRG; tls@ietf.org Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage&q

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-15 Thread Dang, Quynh (Fed)
nding to a success probability of 2^{-32}. Atul On 2017-02-14 11:45, Yoav Nir wrote: Hi, Quynh On 14 Feb 2017, at 20:45, Dang, Quynh (Fed) mailto:quynh.d...@nist.gov>> wrote: Hi Sean and all, Beside my suggestion at https://www.ietf.org/mail-archive/web/tls/current/msg22381.html [1], I hav

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

2017-02-16 Thread Dang, Quynh (Fed)
.3 "Limits on key usage" PRs (#765/#769) Hi Quynh, I'm meant to be on vacation, but I'm finding this on-going discussion fascinating, so I'm chipping in again. On 15 Feb 2017, at 21:12, Dang, Quynh (Fed) mailto:quynh.d...@nist.gov>> wrote: Hi Atul, I hope you

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-02-25 Thread Dang, Quynh (Fed)
Hi Sean, Joe, Eric and all, I would like to address my thoughts/suggestions on 2 issues in option a. 1) The data limit should be addressed in term of blocks, not records. When the record size is not the full size, some user might not know what to do. When the record size is 1 block, the limit

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-03-01 Thread Dang, Quynh (Fed)
g>> Subject: Re: [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769). On 25 Feb 2017, at 14:28, Dang, Quynh (Fed) mailto:quynh.d...@nist.gov>> wrote: Hi Sean, Joe, Eric and all, I would like to address my thoughts/suggestions on 2 issues in option a. 1) The data li

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-03-01 Thread Dang, Quynh (Fed)
gt;>" mailto:tls@ietf.org>> Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769). Hi, On 01/03/2017 14:31, "TLS on behalf of Dang, Quynh (Fed)" mailto:tls-boun...@ietf.org> on behalf of quynh.d...@nist.gov<mailto:quynh.d...@nist.g

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-03-01 Thread Dang, Quynh (Fed)
g>> Subject: Re: [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769). On 01 Mar 2017, at 13:18, Dang, Quynh (Fed) mailto:quynh.d...@nist.gov>> wrote: From: Aaron Zauner mailto:a...@azet.org>> Date: Wednesday, March 1, 2017 at 8:11 AM To: 'Quynh' mai

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-03-01 Thread Dang, Quynh (Fed)
What is the percentage ? Even all records were small, providing a correct number would be a good thing. If someone wants to rekey a lot often, I am not suggesting against that. Quynh. because they result from small writes. On Mar 1, 2017 6:48 AM, "Dang, Quynh (Fed)" mailto:quynh.d...@ni

Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769).

2017-03-02 Thread Dang, Quynh (Fed)
;, "tls@ietf.org<mailto:tls@ietf.org>" mailto:tls@ietf.org>> Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769). On 2 March 2017 at 05:44, Dang, Quynh (Fed) mailto:quynh.d...@nist.gov>> wrote: OK. What is the percentage ? E

Re: [TLS] Requesting working group adoption of draft-stebila-tls-hybrid-design

2020-02-13 Thread Dang, Quynh H. (Fed)
This website has a good summary of the candidates: https://pqc-wiki.fau.edu/w/Special:DatabaseHome . Quynh. From: TLS on behalf of Martin Thomson Sent: Wednesday, February 12, 2020 4:57 PM To: Blumenthal, Uri - 0553 - MITLL ; tls@ietf.org Subject: Re: [TLS]

Re: [TLS] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-11 Thread Dang, Quynh H. (Fed)
Hi Rich, Sean and all, 1) Traditionally, a HKDF-Extract is used to extract entropy from a DH type shared secret. However, the first HKDF-Extract in the key schedule takes a PSK instead of a DH shared secret. We don't see security problems with this instance in TLS 1.3. NIST requires the PSK to

Re: [TLS] [Cfrg] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-12 Thread Dang, Quynh H. (Fed)
d for being used as expansion steps. Regards, Quynh. From: "Torsten Schütze" Sent: Tuesday, May 12, 2020 7:39 AM To: Hugo Krawczyk Cc: Dang, Quynh H. (Fed) ; c...@ietf.org ; tls@ietf.org ; rs...@akamai.com Subject: Re: [Cfrg] NIST crypto group and HKDF (a

Re: [TLS] [Cfrg] NIST crypto group and HKDF (and therefore TLS 1.3)

2020-05-14 Thread Dang, Quynh H. (Fed)
, we'll publish their test vectors. Regards, Quynh. From: "Torsten Schütze" Sent: Tuesday, May 12, 2020 8:36 AM To: Dang, Quynh H. (Fed) Cc: Hugo Krawczyk ; c...@ietf.org ; tls@ietf.org ; rs...@akamai.com Subject: Aw: Re: [Cfrg] NIST crypto group

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Dang, Quynh H. (Fed)
Hi Kris and Deirdre, We talked about cases of X||Y internally at NIST. 1) X is a raw shared secret such as Z in 56C and Y is the output of a NIST-approved PQ KEM. Their order can be reversed. This should be approved for PQ security solution. 2) X is an output of a NIST-approved classical key

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-17 Thread Dang, Quynh H. (Fed)
Hi Eric and all, NIST allows the shared secret key, called K, of a ML-KEM to be in the place of Z (a raw shared secret) in 56C. In 56C, Z can be X||Y, but X must be either a raw shared secret generated by a NIST-approved key agreement/establishment method or K. A X25519’s raw shared secret or

[TLS] Re: X25519MLKEM768 in draft-kwiatkowski-tls-ecdhe-mlkem-02

2024-10-23 Thread Dang, Quynh H. (Fed)
Hi all, Be noted that in this discussion, I don't speak on behalf of anybody else including the NIST PQC team and my message does not intent to imply any technical policies in the future. I just wanted to explain some technical matters. In SP 800-56C, we specified Z = Z' || T as an option whe

[TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys

2024-12-16 Thread Dang, Quynh H. (Fed)
KeyGen is very cheap (generally). So, for many use cases, it seems it does not make sense to keep a private key around for later uses. In very constrained environments, if the goal is to save computation as much as possible, some users could decide to reuse keys. Regards, Quynh. From: Richard

[TLS] Re: Changing WG Mail List Reputation

2025-01-14 Thread Dang, Quynh H. (Fed)
Hi all, It is sad to know that many people would like to join in the discussions but decide not to do so because of their anticipation of the pain they would get and the time they would need to spend. There are ways to help the situation. For example, the chairs could decide to say that 80% a

[TLS] Re: FW: I-D Action: draft-kwiatkowski-tls-ecdhe-mlkem-03.txt

2025-03-10 Thread Dang, Quynh H. (Fed)
The server can detect a reused encapsulation key if it saves the keys which have been received and check the newly received key against the list of its saved keys. The server could just save the hashes of the keys or a "small" portion of the keys as the key IDs. My guess is that that would be a