> In other words, does CNSA 2.0 tolerate ECC, by effectively ignoring its presence, or not?
>From https://www.ietf.org/archive/id/draft-becker-cnsa2-tls-profile-00.html: "In order to meet the goal of a consistent security level for the entire cipher suite, CNSA TLS implementations MUST only use the algorithms listed in this document." That's ML-KEM-1024 and ML-DSA-87 only. On Tue, Nov 19, 2024, 4:52 PM Andrey Jivsov <cry...@brainhub.org> wrote: > Thank you for your replies, but please allow me to explore this. > > My primary question is whether a system signing a message M with both > ML-DSA-87 and an ECC method, where a clear 'path' exists tracing the > message to the ML-DSA-87 signature, would lose CNSA 2.0 compliance just > because there is some other signature somewhere. In other words, does CNSA > 2.0 tolerate ECC, by effectively ignoring its presence, or not? Is there > any reasoning that the presence of an additional and independent ECC > signature could somehow undermine the validity or security of the ML-DSA-87 > signature? > > My interest in this extends beyond TLS. Many systems, including TLS in > constrained environments, often need to commit to a single security > configuration. This raises questions about how to balance such constraints > with compliance. > > The vast majority of vendors and developers implementing TLS or protocols > inspired by its design are not exclusively targeting NSS use. These > providers are hearing concerns about the long-term security of ML-DSA. I > thought that the only practical way to address these concerns while > maintaining CNSA 2.0 compliance is to support signing with both ML-DSA and > ECC (or RSA). > > There is precedent in the FIPS 140 program where the use of non-approved > cryptographic primitives is categorized as either encoding (e.g., > unapproved encryption, compression) or as additional security-irrelevant > data (e.g., unapproved signatures, CRCs), such that this categorization > does not affect security associated with other approved crypto primitives. > > Since we are discussing products not exclusive to NSS use, these products > will include pure ECC and composite ML-DSA + ECC options. If, in addition, > CNSA 2.0 mandates the inclusion of pure ML-DSA, which adds to system > complexity. Some lesser-known protocols are addressing concerns with ML-DSA > in CNSA 2.0 by even more complex solutions than composite signatures: by > signing messages with two certificates -- one using ML-DSA and another > using ECC. Their rationale is, apparently, that a single ML-DSA X.509 > certificate signature clearly satisfies CNSA 2.0 compliance requirements. > Is this approach not a hybrid in CNSA 2.0? If dual signature with 2 X.509 > certs is a hybrid, CNSA 2.0, effectively, prohibits non-NSS use of a > "seatbelt" with ECC in environments that cannot support configurable > crypto, e.g. boot chain security with code in ROM. > > On Tue, Nov 19, 2024 at 8:15 AM aebe...@uwe.nsa.gov <aebe...@uwe.nsa.gov> > wrote: > >> The standalone ML-DSA-87 option specified in this draft is CNSA 2.0 >> compliant. There are no plans to support hybrid solutions for CNSA 2.0 >> (other than where required due to protocol constraints, such as during key >> establishment in IKEv2 as pointed out earlier in this thread). As such, our >> CNSA 2.0 TLS profile requires only standalone ML-KEM-1024, and ML-DSA-87; >> we recently posted an early version: >> https://datatracker.ietf.org/doc/draft-becker-cnsa2-tls-profile >> Cheers, >> Alie >> >> ------------------------------ >> *From:* Deirdre Connolly <durumcrustu...@gmail.com> >> *Sent:* Monday, November 18, 2024 7:43 PM >> *To:* Andrey Jivsov <cry...@brainhub.org> >> *Cc:* D. J. Bernstein <d...@cr.yp.to>; TLS@ietf.org <tls@ietf.org> >> *Subject:* [TLS] Re: ML-DSA in TLS >> >> The CNSA 2.0 FAQ states, "Do not use a hybrid or other non-standardized >> QR solution on NSS mission systems except for those exceptions NSA >> specifically recommends to meet standardization or interoperability >> requirements", and, "because NSA is confident that CNSA 2.0 algorithms will >> sufficiently protect NSS, it does not require a hybrid solution for >> security purposes." They specifically cite IKEv2 as a hybrid exception. >> >> >> https://media.defense.gov/2022/Sep/07/2003071836/-1/-1/0/CSI_CNSA_2.0_FAQ_.PDF >> >> On Mon, Nov 18, 2024, 8:37 PM Andrey Jivsov <cry...@brainhub.org> wrote: >> >> The reality is that we have very tight deadlines from CNSA2.0, with >> customers actively asking for post-quantum support. For those for whom >> those >> requirements apply, use of ML-DSA is not only uncontroversial, but >> mandatory. >> >> >> CNSA 2.0, as clarified in a recent FAQ, does not prohibit ML-DSA+ECC. >> >> On Mon, Nov 18, 2024 at 5:54 AM Alicja Kario <hka...@redhat.com> wrote: >> >> Answering to the broader thread: when I said "uncontroversial" I was >> thinking >> more about _how_ it should be done, not _if_ it should be used. >> >> Answer to email below follows. >> >> On Saturday, 16 November 2024 09:57:03 CET, D. J. Bernstein wrote: >> > Watson Ladd writes: >> >> Authentication is not like encryption. >> > >> > I presume that you're alluding to the following process: if the PQ >> > signature system is broken, we revert to ECC signatures, and then the >> > attacker doesn't benefit from forging the no-longer-accepted signatures >> > (whereas we can't stop attackers from breaking previous ciphertexts). >> > >> > This process leaves computers completely exposed until they've reverted >> > to ECC. Sure, some environments are fast to make changes, but some >> > aren't. For comparison, using ECC+PQ in the first place avoids this >> > security failure, and will make many people less hesitant to upgrade. >> > >> > The revert-in-case-of-disaster process also leaves computers completely >> > exposed to PQ attacks that haven't come to the public's attention yet. >> > Out of the 69 round-1 submissions to NIST, 33 have been publicly broken >> > by now (see https://cr.yp.to/papers.html#pqsrc), with some of the >> > attacks not published for years; is it so hard to imagine that >> > large-scale attackers found some attacks before the public did? >> > >> > More broadly, conflating "no attacks have been published" with "no >> > attacks are being carried out" is unjustified, an extreme form of >> > availability bias. Occasionally there are leaks from attackers >> > illustrating how much damage this mistake has done. Example: >> > >> > >> > >> https://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html >> >> All good points, ones I agree with, but I think those are arguments >> against wide deployment of pure ML-DSA, not against describing how >> the algorithms should be implemented on technical level. >> >> The reality is that we have very tight deadlines from CNSA2.0, with >> customers >> actively asking for post-quantum support. For those for whom those >> requirements >> apply, use of ML-DSA is not only uncontroversial, but mandatory. >> >> And personally, I'd prefer them using ML-DSA than LMS or XMSS... >> >> For the wider Internet, where we want fail-safe options, yes, hybrids are >> probably better. Unfortunately, I don't think we have a rough consensus in >> LAMPS on how hybrid signatures should be done just yet, and without that, >> we can't standardise it for TLS. >> >> (that being said, I don't think ML-DSA will be completely broken >> over-night, >> I suspect it will be weakened over time, so migration off of it won't need >> to happen with high agility... but only time will tell how it will play >> out) >> -- >> Regards, >> Alicja (nee Hubert) Kario >> Principal Quality Engineer, RHEL Crypto team >> Web: www.cz.redhat.com >> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic >> <https://www.google.com/maps/search/Purky%C5%88ova+115,+612+00,+Brno,+Czech+Republic?entry=gmail&source=g> >> >> _______________________________________________ >> TLS mailing list -- tls@ietf.org >> To unsubscribe send an email to tls-le...@ietf.org >> >> _______________________________________________ >> TLS mailing list -- tls@ietf.org >> To unsubscribe send an email to tls-le...@ietf.org >> >>
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org