D. J. Bernstein wrote:
>as far as I know there was only one other cryptographer on record
>recommending against using SIKE.

I am on record multiple times recommending against using _any_ non-standard or 
paywalled algorithms. That includes Kyber, Dilithium, FrodoKEM, Falcon, 
Sphinx+, Classic McEliece, NewHope, NTRU, NTRU Prime, and SIKE….

Sometimes NSA has very good advice:

”NSS customers are reminded that NSA does not recommend and policy does not 
allow implementing or using unapproved, non-standard or experimental 
cryptographic algorithms.”
https://media.defense.gov/2021/Aug/04/2002821837/-1/-1/1/Quantum_FAQs_20210804.PDF

I think it is very sad that deploying a lot of non-standard and experimental 
cryptographic algorithms gives a lot of positive media attention…

NIST does not deserve any criticism for continuing to evaluate SIKE. I would 
also like to see more evaluation of CSIDH where you according to this paper 
don’t agree that the “conservative parameters” suggested by other researchers 
are needed.
https://thomwiggers.nl/publication/secsidh/secsidh.pdf

Cheers,
John

From: TLS <tls-boun...@ietf.org> on behalf of D. J. Bernstein <d...@cr.yp.to>
Date: Wednesday, 8 November 2023 at 01:07
To: tls@ietf.org <tls@ietf.org>
Subject: Re: [TLS] What is the TLS WG plan for quantum-resistant algorithms?
Yoav Nir writes:
> To justify a hybrid key exchange you need people who are both worried
> about quantum computers and worried about cryptanalysis or the new
> algorithms, but are willing to bet that those things won’t happen at
> the same time. Or at least, within the time where the generated key
> still matters.

Google and Cloudflare encrypted quite a bit of actual user data using
SIKE:

   https://blog.cloudflare.com/the-tls-post-quantum-experiment/

The only reason this didn't give the user data away to today's attackers
is that Google and Cloudflare had the common sense to insist that any
post-quantum algorithm be added as a second layer of encryption on top
of the existing X25519 layer, rather than removing the existing layer.

That was in 2019. For anyone who thinks a few years of subsequent study
were enough for the public to identify which post-quantum cryptosystems
are breakable, it's useful to look at NIST's official report

   
https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-20e9e0536295785e&q=1&e=5d9194af-1af7-4655-94f5-fbb34782df29&u=https%3A%2F%2Fweb.archive.org%2Fweb%2F20220705160405%2Fhttps%3A%2F%2Fnvlpubs.nist.gov%2Fnistpubs%2Fir%2F2022%2FNIST.IR.8413.pdf

in July 2022 saying that

   * SIKE is "being considered for future standardization";

   * regarding NIST deciding to throw away FrodoKEM: "While NIST intends
     to select at least one additional KEM not based on structured
     lattices for standardization after the fourth round, three other
     KEM alternates (BIKE, HQC, and SIKE) are better suited than
     FrodoKEM for this role";

   * "SIKE remains an attractive candidate for standardization because
     of its small key and ciphertext sizes";

   * regarding NIST delaying a decision on Classic McEliece: "For
     applications that need a very small ciphertext, SIKE may turn out
     to be more attractive";

   * regarding torsion-point attacks: "there has been no impact on
     SIKE".

SIKE had been advertised in 2021 
(https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-0d78d4ebd1667da1&q=1&e=5d9194af-1af7-4655-94f5-fbb34782df29&u=https%3A%2F%2Feprint.iacr.org%2F2021%2F543)
 as
"A decade unscathed". I think I was the only person speaking up to
object (https://twitter.com/hashbreaker/status/1387779717370048518), and
as far as I know there was only one other cryptographer on record
recommending against using SIKE.

---D. J. Bernstein


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to