On Sun, Dec 15, 2024 at 11:47 PM John Mattsson <john.mattsson=
40ericsson....@dmarc.ietf.org> wrote:

> Angela Robinson from NIST recently summarized the situation as.
> "The key-derivation methods described in NIST SP 800-56C are currently
> only applicable to shared secrets established during a key establishment
> scheme as specified in NIST SP 80056A or 800-56B, or to Z = Z’||T which is
> the combination of shared secret Z’ that was generated as specified in SP
> 800-56A or -56B with another shared secret T that is generated in any way.
> As previously stated, NIST intends to allow all key-derivation methods in
> NIST SP 800-56C to apply to the outputs of the ML-KEM key establishment
> scheme specified in FIPS 203.
>
> Further, NIST intends to allow the 800-56C key derivation methods to apply
> to shared secrets of the form Z = T || Z’, where T and Z’ are as described
> above but in reverse order. That is, we will ensure that either order is
> allowed for FIPS validation in upcoming revisions to -56C. Note, however,
> that the order of the shared secrets will need to be specified at the
> protocol level to avoid confusion. We are working on guidance to ensure
> that this reordering will not introduce security vulnerabilities. NIST is
> open to feedback on the matter."
>
> https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ST_yMzYyMl0/m/hEMfXBFHCgAJ
> <
> https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ST_yMzYyMl0/m/hEMfXBFHCgAJ>
>
>
> https://csrc.nist.gov/news/2024/public-comments-requested-on-the-sp-800-56-subseri
> <
> https://csrc.nist.gov/news/2024/public-comments-requested-on-the-sp-800-56-subseri>
>
>
> So it is not correct as I wrote that X25519MLKEM768 is NIST approved yet
> but X25519MLKEM768 and MLKEM768 will be soon. NIST does not need to approve
> X25519. ML-KEM is used as Z and T can be anything including X25519.


On the wire, X25519MLKEM768 puts the MLKEM shared secret first, so it
actually is fine for FIPS (but we still need a FIPS approved module for
MLKEM).



>
> The second change applies to SecP256r1MLKEM768, which is currently
> approved, and with the suggested change would continue to be approved even
> when P-256 is not.
>
> Cheers,
> John
>
> From: Blumenthal, Uri - 0553 - MITLL <u...@ll.mit.edu>
> Date: Sunday, 15 December 2024 at 19:15
> To: John Mattsson <john.matts...@ericsson.com>, Stephen Farrell <
> stephen.farr...@cs.tcd.ie>
> Cc: tls@ietf.org <tls@ietf.org>
> Subject: Re: [TLS] Re: [EXT] Re: draft-connolly-tls-mlkem-key-agreement
>
> >It is obvious that pure PQ KEMs are the future
> I am not sure about that. X25519MLKEM768 is already quickly becoming the
> new de facto standard (google.com, ericsson.com,
> government.se, etc. are already using it, likely thanks to Cloudflare).
>
> Do you seriously expect governments and standards bodies to keep approving
> X25519 component after CRQC existence becomes public knowledge? What
> purpose would it serve then?
>
> It is already compliant with NIST specifications and soon it will be
> possible to get FIPS certification. Not clear that the benefits of
> migrating from X25519MLKEM768 to MLKEM768 will be worth it performance and
> marketing wise.
>
> Do you mean that, e.g., NIST will keep then-broken X25519 in the standard
> until MLKEM is obsoleted too? It is not impossible – but I find it rather
> hard to believe.
>
> From: Stephen Farrell <stephen.farr...@cs.tcd.ie>
> Date: Sunday, 15 December 2024 at 15:33
> To: Blumenthal, Uri - 0553 - MITLL <u...@ll.mit.edu>
> Cc: tls@ietf.org <tls@ietf.org>
> Subject: [TLS] Re: [EXT] Re: draft-connolly-tls-mlkem-key-agreement
>
>
> Hiya,
>
> On 15/12/2024 02:33, Blumenthal, Uri - 0553 - MITLL wrote:
> > Stephen, I don’t think attempting to develop consensus in this case
> > would be either useful or productive.
>
> Strongly disagree. I think we ought consider it our duty to
> develop guidance for those deploying e.g. TLS now that we're
> adding a plethora of new ciphersuites, some useful, some way
> less so, and some possibly even risky.
>
> >...
> > Thus, I don’t think there’s a way to bring these two camps together,
> > nor do I see a need for that.
>
> I have no desire to affect the opinions of the sigint agencies
> who have come up with 100% contradictory positions. It's not
> them I care about at all, but rather those deploying the set of
> protocols we develop here.
>
> > Let TLS offer both hybrid and pure
> > KEMs.
>
> For TLS, that's inherent in our current IANA regisration model
> and has already happened.
>
> > And be done with it.
>
> My point is that we are not done with it - we should be offering
> guidance on what to use when. If we do not do that, IMO we'd be
> doing a disservice to the Internet community.
>
> Cheers,
> S.
>
>
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-le...@ietf.org
>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to