Am Montag, 19. Juni 2023, 15:56:57 CEST schrieb Scott Fluhrer (sfluhrer):

Hi Scott,

> I do not believe that Müller is correct - we do not intend use the Kyber CPA
> public key encryption interface, but instead the Kyber CCA KEM interface. 
> And, with that interface, the server does contribute to the shared secret:
> 
> The shared secret that Kyber KEM (round 3) generates on success is:
> 
> KDF( G( m || H(pk)) || H(c) )
> 
> where:
>       - m is the hash of a value that the server selects
>       - pk is the public key selected by the client
>       - c is the server's keyshare
>       - H is SHA3-256, G is SHA3-512, KDF - SHAKE-256
> Note that this formula includes a value (pk) that is selected solely by the
> client; hence we cannot say that this value contains only values selected
> by the server. (reference: algorithms 8, 9 of the round 3 Kyber submission)

My concern is that the security strength cannot depend on the pk, because the 
PK is sent in clear over the wire. Thus it cannot contain entropy. Thus, 
entropy only comes from the message m in your listing which is a random number 
that is generated by the server. Further, c depends on m and thus does not add 
any entropy either.

Ciao
Stephan


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to