Thank you for your replies, but please allow me to explore this.

My primary question is whether a system signing a message M with both
ML-DSA-87 and an ECC method, where a clear 'path' exists tracing the
message to the ML-DSA-87 signature, would lose CNSA 2.0 compliance just
because there is some other signature somewhere. In other words, does CNSA
2.0 tolerate ECC, by effectively ignoring its presence, or not? Is there
any reasoning that the presence of an additional and independent ECC
signature could somehow undermine the validity or security of the ML-DSA-87
signature?

My interest in this extends beyond TLS. Many systems, including TLS in
constrained environments, often need to commit to a single security
configuration. This raises questions about how to balance such constraints
with compliance.

The vast majority of vendors and developers implementing TLS or protocols
inspired by its design are not exclusively targeting NSS use. These
providers are hearing concerns about the long-term security of ML-DSA. I
thought that the only practical way to address these concerns while
maintaining CNSA 2.0 compliance is to support signing with both ML-DSA and
ECC (or RSA).

There is precedent in the FIPS 140 program where the use of non-approved
cryptographic primitives is categorized as either encoding (e.g.,
unapproved encryption, compression) or as additional security-irrelevant
data (e.g., unapproved signatures, CRCs), such that this categorization
does not affect security associated with other approved crypto primitives.

Since we are discussing products not exclusive to NSS use, these products
will include pure ECC and composite ML-DSA + ECC options. If, in addition,
CNSA 2.0 mandates the inclusion of pure ML-DSA, which adds to system
complexity. Some lesser-known protocols are addressing concerns with ML-DSA
in CNSA 2.0 by even more complex solutions than composite signatures: by
signing messages with two certificates -- one using ML-DSA and another
using ECC. Their rationale is, apparently, that a single ML-DSA X.509
certificate signature clearly satisfies CNSA 2.0 compliance requirements.
Is this approach not a hybrid in CNSA 2.0? If dual signature with 2 X.509
certs is a hybrid, CNSA 2.0, effectively, prohibits non-NSS use of a
"seatbelt" with ECC in environments that cannot support configurable
crypto, e.g. boot chain security with code in ROM.

On Tue, Nov 19, 2024 at 8:15 AM aebe...@uwe.nsa.gov <aebe...@uwe.nsa.gov>
wrote:

> The standalone ML-DSA-87 option specified in this draft is CNSA 2.0
> compliant. There are no plans to support hybrid solutions for CNSA 2.0
> (other than where required due to protocol constraints, such as during key
> establishment in IKEv2 as pointed out earlier in this thread). As such, our
> CNSA 2.0 TLS profile requires only standalone ML-KEM-1024, and ML-DSA-87;
> we recently posted an early version:
> https://datatracker.ietf.org/doc/draft-becker-cnsa2-tls-profile
> Cheers,
> Alie
>
> ------------------------------
> *From:* Deirdre Connolly <durumcrustu...@gmail.com>
> *Sent:* Monday, November 18, 2024 7:43 PM
> *To:* Andrey Jivsov <cry...@brainhub.org>
> *Cc:* D. J. Bernstein <d...@cr.yp.to>; TLS@ietf.org <tls@ietf.org>
> *Subject:* [TLS] Re: ML-DSA in TLS
>
> The CNSA 2.0 FAQ states, "Do not use a hybrid or other non-standardized QR
> solution on NSS mission systems except for those exceptions NSA
> specifically recommends to meet standardization or  interoperability
> requirements", and, "because NSA is confident that CNSA 2.0 algorithms will
> sufficiently protect NSS, it does not require a  hybrid solution for
> security purposes." They specifically cite IKEv2 as a hybrid exception.
>
>
> https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
>
> On Mon, Nov 18, 2024, 8:37 PM Andrey Jivsov <cry...@brainhub.org> wrote:
>
> The reality is that we have very tight deadlines from CNSA2.0, with
> customers actively asking for post-quantum support. For those for whom
> those
> requirements apply, use of ML-DSA is not only uncontroversial, but
> mandatory.
>
>
> CNSA 2.0, as clarified in a recent FAQ, does not prohibit ML-DSA+ECC.
>
> On Mon, Nov 18, 2024 at 5:54 AM Alicja Kario <hka...@redhat.com> wrote:
>
> Answering to the broader thread: when I said "uncontroversial" I was
> thinking
> more about _how_ it should be done, not _if_ it should be used.
>
> Answer to email below follows.
>
> On Saturday, 16 November 2024 09:57:03 CET, D. J. Bernstein wrote:
> > Watson Ladd writes:
> >> Authentication is not like encryption.
> >
> > I presume that you're alluding to the following process: if the PQ
> > signature system is broken, we revert to ECC signatures, and then the
> > attacker doesn't benefit from forging the no-longer-accepted signatures
> > (whereas we can't stop attackers from breaking previous ciphertexts).
> >
> > This process leaves computers completely exposed until they've reverted
> > to ECC. Sure, some environments are fast to make changes, but some
> > aren't. For comparison, using ECC+PQ in the first place avoids this
> > security failure, and will make many people less hesitant to upgrade.
> >
> > The revert-in-case-of-disaster process also leaves computers completely
> > exposed to PQ attacks that haven't come to the public's attention yet.
> > Out of the 69 round-1 submissions to NIST, 33 have been publicly broken
> > by now (see https://cr.yp.to/papers.html#pqsrc), with some of the
> > attacks not published for years; is it so hard to imagine that
> > large-scale attackers found some attacks before the public did?
> >
> > More broadly, conflating "no attacks have been published" with "no
> > attacks are being carried out" is unjustified, an extreme form of
> > availability bias. Occasionally there are leaks from attackers
> > illustrating how much damage this mistake has done. Example:
> >
> >
> >
> https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
>
> All good points, ones I agree with, but I think those are arguments
> against wide deployment of pure ML-DSA, not against describing how
> the algorithms should be implemented on technical level.
>
> The reality is that we have very tight deadlines from CNSA2.0, with
> customers
> actively asking for post-quantum support. For those for whom those
> requirements
> apply, use of ML-DSA is not only uncontroversial, but mandatory.
>
> And personally, I'd prefer them using ML-DSA than LMS or XMSS...
>
> For the wider Internet, where we want fail-safe options, yes, hybrids are
> probably better. Unfortunately, I don't think we have a rough consensus in
> LAMPS on how hybrid signatures should be done just yet, and without that,
> we can't standardise it for TLS.
>
> (that being said, I don't think ML-DSA will be completely broken
> over-night,
> I suspect it will be weakened over time, so migration off of it won't need
> to happen with high agility... but only time will tell how it will play
> out)
> --
> Regards,
> Alicja (nee Hubert) Kario
> Principal Quality Engineer, RHEL Crypto team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
> <https://www.google.com/maps/search/Purky%C5%88ova+115,+612+00,+Brno,+Czech+Republic?entry=gmail&source=g>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to