(and AES-256-GCM)

On Tue, Nov 19, 2024, 5:11 PM Deirdre Connolly <durumcrustu...@gmail.com>
wrote:

> > In other words, does CNSA 2.0 tolerate ECC, by effectively ignoring its
> presence, or not?
>
> From
> https://www.ietf.org/archive/id/draft-becker-cnsa2-tls-profile-00.html:
>
> "In order to meet the goal of a consistent security level for the entire
> cipher suite, CNSA TLS implementations MUST only use the algorithms listed
> in this document." That's ML-KEM-1024 and ML-DSA-87 only.
>
> On Tue, Nov 19, 2024, 4:52 PM Andrey Jivsov <cry...@brainhub.org> wrote:
>
>> Thank you for your replies, but please allow me to explore this.
>>
>> My primary question is whether a system signing a message M with both
>> ML-DSA-87 and an ECC method, where a clear 'path' exists tracing the
>> message to the ML-DSA-87 signature, would lose CNSA 2.0 compliance just
>> because there is some other signature somewhere. In other words, does CNSA
>> 2.0 tolerate ECC, by effectively ignoring its presence, or not? Is there
>> any reasoning that the presence of an additional and independent ECC
>> signature could somehow undermine the validity or security of the ML-DSA-87
>> signature?
>>
>> My interest in this extends beyond TLS. Many systems, including TLS in
>> constrained environments, often need to commit to a single security
>> configuration. This raises questions about how to balance such constraints
>> with compliance.
>>
>> The vast majority of vendors and developers implementing TLS or protocols
>> inspired by its design are not exclusively targeting NSS use. These
>> providers are hearing concerns about the long-term security of ML-DSA. I
>> thought that the only practical way to address these concerns while
>> maintaining CNSA 2.0 compliance is to support signing with both ML-DSA and
>> ECC (or RSA).
>>
>> There is precedent in the FIPS 140 program where the use of non-approved
>> cryptographic primitives is categorized as either encoding (e.g.,
>> unapproved encryption, compression) or as additional security-irrelevant
>> data (e.g., unapproved signatures, CRCs), such that this categorization
>> does not affect security associated with other approved crypto primitives.
>>
>> Since we are discussing products not exclusive to NSS use, these products
>> will include pure ECC and composite ML-DSA + ECC options. If, in addition,
>> CNSA 2.0 mandates the inclusion of pure ML-DSA, which adds to system
>> complexity. Some lesser-known protocols are addressing concerns with ML-DSA
>> in CNSA 2.0 by even more complex solutions than composite signatures: by
>> signing messages with two certificates -- one using ML-DSA and another
>> using ECC. Their rationale is, apparently, that a single ML-DSA X.509
>> certificate signature clearly satisfies CNSA 2.0 compliance requirements.
>> Is this approach not a hybrid in CNSA 2.0? If dual signature with 2 X.509
>> certs is a hybrid, CNSA 2.0, effectively, prohibits non-NSS use of a
>> "seatbelt" with ECC in environments that cannot support configurable
>> crypto, e.g. boot chain security with code in ROM.
>>
>> On Tue, Nov 19, 2024 at 8:15 AM aebe...@uwe.nsa.gov <aebe...@uwe.nsa.gov>
>> wrote:
>>
>>> The standalone ML-DSA-87 option specified in this draft is CNSA 2.0
>>> compliant. There are no plans to support hybrid solutions for CNSA 2.0
>>> (other than where required due to protocol constraints, such as during key
>>> establishment in IKEv2 as pointed out earlier in this thread). As such, our
>>> CNSA 2.0 TLS profile requires only standalone ML-KEM-1024, and ML-DSA-87;
>>> we recently posted an early version:
>>> https://datatracker.ietf.org/doc/draft-becker-cnsa2-tls-profile
>>> Cheers,
>>> Alie
>>>
>>> ------------------------------
>>> *From:* Deirdre Connolly <durumcrustu...@gmail.com>
>>> *Sent:* Monday, November 18, 2024 7:43 PM
>>> *To:* Andrey Jivsov <cry...@brainhub.org>
>>> *Cc:* D. J. Bernstein <d...@cr.yp.to>; TLS@ietf.org <tls@ietf.org>
>>> *Subject:* [TLS] Re: ML-DSA in TLS
>>>
>>> The CNSA 2.0 FAQ states, "Do not use a hybrid or other non-standardized
>>> QR solution on NSS mission systems except for those exceptions NSA
>>> specifically recommends to meet standardization or  interoperability
>>> requirements", and, "because NSA is confident that CNSA 2.0 algorithms will
>>> sufficiently protect NSS, it does not require a  hybrid solution for
>>> security purposes." They specifically cite IKEv2 as a hybrid exception.
>>>
>>>
>>> https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF
>>>
>>> On Mon, Nov 18, 2024, 8:37 PM Andrey Jivsov <cry...@brainhub.org> wrote:
>>>
>>> The reality is that we have very tight deadlines from CNSA2.0, with
>>> customers actively asking for post-quantum support. For those for whom
>>> those
>>> requirements apply, use of ML-DSA is not only uncontroversial, but
>>> mandatory.
>>>
>>>
>>> CNSA 2.0, as clarified in a recent FAQ, does not prohibit ML-DSA+ECC.
>>>
>>> On Mon, Nov 18, 2024 at 5:54 AM Alicja Kario <hka...@redhat.com> wrote:
>>>
>>> Answering to the broader thread: when I said "uncontroversial" I was
>>> thinking
>>> more about _how_ it should be done, not _if_ it should be used.
>>>
>>> Answer to email below follows.
>>>
>>> On Saturday, 16 November 2024 09:57:03 CET, D. J. Bernstein wrote:
>>> > Watson Ladd writes:
>>> >> Authentication is not like encryption.
>>> >
>>> > I presume that you're alluding to the following process: if the PQ
>>> > signature system is broken, we revert to ECC signatures, and then the
>>> > attacker doesn't benefit from forging the no-longer-accepted signatures
>>> > (whereas we can't stop attackers from breaking previous ciphertexts).
>>> >
>>> > This process leaves computers completely exposed until they've reverted
>>> > to ECC. Sure, some environments are fast to make changes, but some
>>> > aren't. For comparison, using ECC+PQ in the first place avoids this
>>> > security failure, and will make many people less hesitant to upgrade.
>>> >
>>> > The revert-in-case-of-disaster process also leaves computers completely
>>> > exposed to PQ attacks that haven't come to the public's attention yet.
>>> > Out of the 69 round-1 submissions to NIST, 33 have been publicly broken
>>> > by now (see https://cr.yp.to/papers.html#pqsrc), with some of the
>>> > attacks not published for years; is it so hard to imagine that
>>> > large-scale attackers found some attacks before the public did?
>>> >
>>> > More broadly, conflating "no attacks have been published" with "no
>>> > attacks are being carried out" is unjustified, an extreme form of
>>> > availability bias. Occasionally there are leaks from attackers
>>> > illustrating how much damage this mistake has done. Example:
>>> >
>>> >
>>> >
>>> https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html
>>>
>>> All good points, ones I agree with, but I think those are arguments
>>> against wide deployment of pure ML-DSA, not against describing how
>>> the algorithms should be implemented on technical level.
>>>
>>> The reality is that we have very tight deadlines from CNSA2.0, with
>>> customers
>>> actively asking for post-quantum support. For those for whom those
>>> requirements
>>> apply, use of ML-DSA is not only uncontroversial, but mandatory.
>>>
>>> And personally, I'd prefer them using ML-DSA than LMS or XMSS...
>>>
>>> For the wider Internet, where we want fail-safe options, yes, hybrids are
>>> probably better. Unfortunately, I don't think we have a rough consensus
>>> in
>>> LAMPS on how hybrid signatures should be done just yet, and without that,
>>> we can't standardise it for TLS.
>>>
>>> (that being said, I don't think ML-DSA will be completely broken
>>> over-night,
>>> I suspect it will be weakened over time, so migration off of it won't
>>> need
>>> to happen with high agility... but only time will tell how it will play
>>> out)
>>> --
>>> Regards,
>>> Alicja (nee Hubert) Kario
>>> Principal Quality Engineer, RHEL Crypto team
>>> Web: www.cz.redhat.com
>>> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
>>> <https://www.google.com/maps/search/Purky%C5%88ova+115,+612+00,+Brno,+Czech+Republic?entry=gmail&source=g>
>>>
>>> _______________________________________________
>>> TLS mailing list -- tls@ietf.org
>>> To unsubscribe send an email to tls-le...@ietf.org
>>>
>>> _______________________________________________
>>> TLS mailing list -- tls@ietf.org
>>> To unsubscribe send an email to tls-le...@ietf.org
>>>
>>>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to