Filippo Valsorda writes: > 2025-06-07 19:49 GMT+02:00 Loganaden Velvindron <logana...@gmail.com>: > > ML-KEM implementations may suffer from compiler optimizations that could > > weaken > > the security properties of a pure ML-KEM implementation such as Kyberslash. > That is both a general risk
Indeed, even for something as traditional as ECC, we're continuing to find implementation vulnerabilities (such as CVE-2023-6135 in Firefox; see https://cr.yp.to/papers.html#safecurves for many more examples and in-depth analysis). Presumably what we're now seeing from compilers (see generally https://cr.yp.to/papers.html#cryptoint) will produce some exploitable problems in ECC software. > independent of the algorithm, Wait, why would one expect every algorithm to have the same probability of implementation vulnerabilities? Every report tracing vulnerabilities to particular algorithm features is evidence to the contrary. For example, we have a clear understanding of how some curves lead to point-validation disasters while others don't. The latest wave of compiler issues needs more study, but it would be astonishing if this affects every algorithm equally. What's very easy to see is that switching from ECC to PQ has a higher probability of implementation-security disasters than using an ECC+PQ hybrid. This isn't denying the possibility of compilers screwing up _both_ the ECC part and the PQ part; it's saying that leaving out ECC increases user risk. This is one of the reasons to recommend hybrids. > and in the specific case only applicable when reusing public keys. Regarding the three different timing leaks discovered so far in the reference Kyber software, it's true that the first demos of key extraction have targeted keys used many times. However, seeing that a demo works in situation X doesn't say that the underlying vulnerability is exploitable _only_ in situation X, never mind the whole class of vulnerabilities. These demos succeeded using only low-bandwidth information about the time taken by the Kyber software. Higher-bandwidth timing channels are known and presumably would allow attacks using fewer dec invocations, especially in the context of hyperthreading, enclaves, etc. Maybe using a key for just one dec is safe, but maybe not. ---D. J. Bernstein (KyberSlash coauthor but speaking for myself) _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org