On Sat, Nov 02, 2024 at 07:12:02AM +0000, John Mattsson wrote: > Eric Rescorla wrote: > >Is reuse of ML-KEM keys worse in some way than the reuse of ECDHE keys? > > No reuse of ephemeral keys is always bad.
But ML-KEM is specifically designed (IND-CCA2, via FO transform) to support key reuse, without immediate advantage to the attacker. And (though it isn't exactly TLS 1.3) there are ideas in place like KEMTLS, in which the server key is actually stable (used as both a KEM and for authentication, obviating the need for separate signing of the key exchange). And so long as the client's encap ciphertext is different each time, there's no issue with linking connections. So perhaps the story is a bit more nuanced than "key reuse is always bad", but of course any design that incorporates key reuse needs to take care to do it correctly. Specifically, in stock TLS 1.3, (with the client side generating keys, and doing "decap") it seems that key reuse is not particularly compelling, and servers don't have a key they can reuse, "encap" just consumes a nonce and the client's public key. -- Viktor. _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org