The standalone ML-DSA-87 option specified in this draft is CNSA 2.0 compliant. 
There are no plans to support hybrid solutions for CNSA 2.0 (other than where 
required due to protocol constraints, such as during key establishment in IKEv2 
as pointed out earlier in this thread). As such, our CNSA 2.0 TLS profile 
requires only standalone ML-KEM-1024, and ML-DSA-87; we recently posted an 
early version: https://datatracker.ietf.org/doc/draft-becker-cnsa2-tls-profile
Cheers,
Alie

________________________________
From: Deirdre Connolly <durumcrustu...@gmail.com>
Sent: Monday, November 18, 2024 7:43 PM
To: Andrey Jivsov <cry...@brainhub.org>
Cc: D. J. Bernstein <d...@cr.yp.to>; TLS@ietf.org <tls@ietf.org>
Subject: [TLS] Re: ML-DSA in TLS

The CNSA 2.0 FAQ states, "Do not use a hybrid or other non-standardized QR 
solution on NSS mission systems except for those exceptions NSA specifically 
recommends to meet standardization or  interoperability requirements", and, 
"because NSA is confident that CNSA 2.0 algorithms will sufficiently protect 
NSS, it does not require a  hybrid solution for security purposes." They 
specifically cite IKEv2 as a hybrid exception.

https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF

On Mon, Nov 18, 2024, 8:37 PM Andrey Jivsov 
<cry...@brainhub.org<mailto:cry...@brainhub.org>> wrote:
The reality is that we have very tight deadlines from CNSA2.0, with
customers actively asking for post-quantum support. For those for whom those
requirements apply, use of ML-DSA is not only uncontroversial, but mandatory.

CNSA 2.0, as clarified in a recent FAQ, does not prohibit ML-DSA+ECC.

On Mon, Nov 18, 2024 at 5:54 AM Alicja Kario 
<hka...@redhat.com<mailto:hka...@redhat.com>> wrote:
Answering to the broader thread: when I said "uncontroversial" I was
thinking
more about _how_ it should be done, not _if_ it should be used.

Answer to email below follows.

On Saturday, 16 November 2024 09:57:03 CET, D. J. Bernstein wrote:
> Watson Ladd writes:
>> Authentication is not like encryption.
>
> I presume that you're alluding to the following process: if the PQ
> signature system is broken, we revert to ECC signatures, and then the
> attacker doesn't benefit from forging the no-longer-accepted signatures
> (whereas we can't stop attackers from breaking previous ciphertexts).
>
> This process leaves computers completely exposed until they've reverted
> to ECC. Sure, some environments are fast to make changes, but some
> aren't. For comparison, using ECC+PQ in the first place avoids this
> security failure, and will make many people less hesitant to upgrade.
>
> The revert-in-case-of-disaster process also leaves computers completely
> exposed to PQ attacks that haven't come to the public's attention yet.
> Out of the 69 round-1 submissions to NIST, 33 have been publicly broken
> by now (see https://cr.yp.to/papers.html#pqsrc), with some of the
> attacks not published for years; is it so hard to imagine that
> large-scale attackers found some attacks before the public did?
>
> More broadly, conflating "no attacks have been published" with "no
> attacks are being carried out" is unjustified, an extreme form of
> availability bias. Occasionally there are leaks from attackers
> illustrating how much damage this mistake has done. Example:
>
>
> https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html

All good points, ones I agree with, but I think those are arguments
against wide deployment of pure ML-DSA, not against describing how
the algorithms should be implemented on technical level.

The reality is that we have very tight deadlines from CNSA2.0, with
customers
actively asking for post-quantum support. For those for whom those
requirements
apply, use of ML-DSA is not only uncontroversial, but mandatory.

And personally, I'd prefer them using ML-DSA than LMS or XMSS...

For the wider Internet, where we want fail-safe options, yes, hybrids are
probably better. Unfortunately, I don't think we have a rough consensus in
LAMPS on how hybrid signatures should be done just yet, and without that,
we can't standardise it for TLS.

(that being said, I don't think ML-DSA will be completely broken
over-night,
I suspect it will be weakened over time, so migration off of it won't need
to happen with high agility... but only time will tell how it will play
out)
--
Regards,
Alicja (nee Hubert) Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com<http://www.cz.redhat.com/>
Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech 
Republic<https://www.google.com/maps/search/Purky%C5%88ova+115,+612+00,+Brno,+Czech+Republic?entry=gmail&source=g>

_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-le...@ietf.org<mailto:tls-le...@ietf.org>
_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-le...@ietf.org<mailto:tls-le...@ietf.org>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to