OK; what about ML-KEM only?

On Mon, Nov 11, 2024, 9:58 AM Bas Westerbaan <b...@cloudflare.com> wrote:

> That was before the release of FIPS 203.
>
> On Mon, 11 Nov 2024 at 18:29, Deirdre Connolly <durumcrustu...@gmail.com>
> wrote:
>
>> Two meetings ago there was a consistent vibe in the room that
>> Recommend'ing any PQ parameters, hybrid or no, was premature; has that
>> changed?
>>
>> On Mon, Nov 11, 2024 at 9:00 AM Alicja Kario <hka...@redhat.com> wrote:
>>
>>> On Sunday, 10 November 2024 13:38:38 CET, Kris Kwiatkowski wrote:
>>> > Hello,
>>> >
>>> > As discussed during the TLS session at IETF 121, we would like
>>> > to propose the adoption of draft-kwiatkowski-tls-ecdhe-mlkem.
>>>
>>> Very much in favour of adopting this draft.
>>>
>>> > There are a few open questions that need to be addressed:
>>> >
>>> > 1. **Alignment of NamedGroup X25519MLKEM768** with the order of
>>> > shared secrets, as per Section 3.2 of
>>> > draft-ietf-tls-hybrid-design.
>>> >    - I suggest updating the name to mlkem768_x25519, while
>>> > keeping the codepoint unchanged (if that is acceptable). If
>>> >      this change is made, I also recommend changing the name of
>>> > Secp256r1MLKEM768 to align with x25519.
>>>
>>> while I'd /like/ for the name to remain, I'm not opposed to changing it,
>>> especially if we make it so that the order in the name matches the order
>>> in the shares and derived secrets
>>> (I've already seen names all over the place for the codepoint, so the
>>> name isn't consistent across different implementations already...)
>>>
>>> no preference for mlkem768_x25519 vs MLKEM768X25519 vs mlkem768x25519
>>>
>>> OTOH, if NIST doesn't change their stance, then having name represent the
>>> order, and there still being interest in hybrid at a time when P-256 and
>>> P-384 are not approved, would give a clear description for the new point,
>>> new name, with the order reversed
>>>
>>> Given how widely it is already deployed, I'm very strongly opposed to
>>> changing the codepoint or its meaning.
>>>
>>> > 2. **Changing the order of shares in Secp256r1MLKEM768**.
>>> >    - The current order is based on requirements from
>>> >      SP800-56C-r2, and it was chosen to facilitate the migration of
>>> >      the TLSv1.3
>>> >      handshake in a flow requiring FIPS certification. Although
>>> >      the switched order of shares aligns with FIPS, it necessitates
>>> >      the re-certification of the cryptographic module. The
>>> >      current order supports modules that are already deployed in the
>>> >      field.
>>> >      My (slight) personal preference would be to proceed with
>>> >      adoption but switch the order only if NIST relaxes the
>>> >      requirement
>>> >      regarding the order of shares in SP800-56C-r2, which we
>>> >      know is under discussion. Otherwise, I believe the current
>>> >      choice
>>> >      better supports migration to non-hybrid MLKEM, but I would
>>> >      appreciate feedback on this decision (ideally from others who
>>> >      have a requirement for FIPS).
>>>
>>> I'm opposed to changing the order. The way it is right now (for all three
>>> codepoints) is good. Especially speaking as a vendor intersted in FIPS
>>> compliance.
>>>
>>> Even *if* NIST relaxes the requirements, we don't know *when* that will
>>> happen.
>>> We have explicit confirmation that as long as the first algorithm is
>>> FIPS approved, then the whole SP800-56Cr2 scheme is, so I think, for FIPS
>>> compliance, we're good.
>>>
>>> If in the future it will turn out that we want a hybrid with ML-KEM-1024
>>> first, registering it won't be too much work.
>>> (Or NIST may say that ML-KEM is fine as the second one iff the first
>>> shared secret was "formely NIST approved algorithm", we don't know.)
>>>
>>> And even without it, we already have codepoints for pure ML-KEM of all
>>> sizes.
>>>
>>> So, I think the three codepoints are the minimal set to handle:
>>>  * the general Internet
>>>  * FIPS compliance
>>>  * Common Criteria Protection Profile compliance
>>>
>>> with as little friction to roll them out as possible.
>>>
>>> I think this is the main thing we should have in mind: we want people
>>> using PQC key exchanges as soon as possible as widely as possible.
>>>
>>> > 3. **Setting RECOMMENDED=Y for Secp256r1MLKEM768**.
>>>
>>> Since all three (secp256r1, secp384r1, and x25519) are RECOMMENDED=Y,
>>> I think we should set "Y" for those three algorithms too.
>>>
>>> > Additionally, we plan to register Secp384r1MLKEM1024, but I
>>> > believe this should only be done once we reach a consensus
>>> > regarding
>>> > point 2.
>>> >
>>> > Thank you!
>>>
>>> --
>>> Regards,
>>> Alicja (nee Hubert) Kario
>>> Principal Quality Engineer, RHEL Crypto team
>>> Web: www.cz.redhat.com
>>> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
>>> <https://www.google.com/maps/search/Purky%C5%88ova+115,+612+00,+Brno,+Czech+Republic?entry=gmail&source=g>
>>>
>>> _______________________________________________
>>> TLS mailing list -- tls@ietf.org
>>> To unsubscribe send an email to tls-le...@ietf.org
>>>
>> _______________________________________________
>> TLS mailing list -- tls@ietf.org
>> To unsubscribe send an email to tls-le...@ietf.org
>>
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to