Trying to pull this up to its own subject

Here's a stab at more text around hybrid vs not-hybrid in Security
Considerations:

# Security Considerations {#security-considerations}

 This document defines standalone ML-KEM key establishment for TLS 1.3.
 Hybrid key establishment mechanisms, which support combining a post-quantum
 algorithm with a traditional algorithm such as ECDH, are supported
 generically via {{HYBRID}} with some concrete definitions in
 {{ECDHE-MLKEM}}. Hybrid mechanisms provide security as long as at least one
 of the component algorithms remains unbroken, such as combining
 quantum-resistant and traditional cryptographic assumptions. Standalone
 ML-KEM relies on lattice-based and hash function cryptographic assumptions
-for its security.
+for its security. Proponents of hybrid PQ/T key establishment generally
+consider it a conservative approach to deployment of newer post-quantum
+schemes alongside older traditional schemes, retaining at least the
security
+currently offered by traditional algorithms.

On Fri, Feb 27, 2026 at 8:29 PM Deirdre Connolly <[email protected]>
wrote:

> Here's a stab at more text around hybrid vs not-hybrid in Security
> Considerations:
>
> # Security Considerations {#security-considerations}
>
>  This document defines standalone ML-KEM key establishment for TLS 1.3.
>  Hybrid key establishment mechanisms, which support combining a
> post-quantum
>  algorithm with a traditional algorithm such as ECDH, are supported
>  generically via {{HYBRID}} with some concrete definitions in
>  {{ECDHE-MLKEM}}. Hybrid mechanisms provide security as long as at least
> one
>  of the component algorithms remains unbroken, such as combining
>  quantum-resistant and traditional cryptographic assumptions. Standalone
>  ML-KEM relies on lattice-based and hash function cryptographic assumptions
> -for its security.
> +for its security. Proponents of hybrid PQ/T key establishment generally
> +consider it a conservative approach to deployment of newer post-quantum
> +schemes alongside older traditional schemes, retaining at least the
> security
> +currently offered by traditional algorithms.
>
>
> On Fri, Feb 27, 2026 at 4:54 PM Benjamin Kaduk <bkaduk=
> [email protected]> wrote:
>
>> On Thu, Feb 12, 2026 at 11:05:22AM -0800, Joseph Salowey wrote:
>> >    This Message Is From an Untrusted Sender
>> >    You have not previously corresponded with this sender.
>> >
>> >
>> >    This message starts the second Working Group Last Call for the pure
>> ML-KEM
>> >    document (draft-ietf-tls-mlkem-07).
>> >
>> >    The file can be retrieved from:
>> >
>> >    [1]https://datatracker.ietf.org/doc/draft-ietf-tls-mlkem/
>> >
>> >    The diff with the previous WGLC draft (-05) is here:
>> >
>> >    [2]
>> https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-mlkem-05&url2=draft-ietf-tls-mlkem-07&difftype=--html
>> >
>> >    The main focus of this WGLC is to review new text providing more
>> context
>> >    around the use of pure ML-KEM.  For those who indicated they wanted
>> this
>> >    text, please let us know if the new text satisfies you and if you
>> support
>> >    publication. This working group last call will end on February 27,
>> 2026.
>>
>> Thanks Dierdre for the link to the diff with the working copy [0].
>>
>> Looking at that in the context of my review for the previous WGLC [1],
>> I'm glad
>> to see that the text implicitly redefining KeyShare semantics has been
>> removed.
>>
>> I'm also happy to see that text has been added to list specific use cases
>> where
>> standalone PQ (i.e., non-hybrid) key exchange is perceived to be useful
>> or is
>> mandated.  However, that text alone does not address the crux of my
>> concern
>> with the heading "Security considerations of non-hybrid", which I will
>> try to
>> distill to a core idea here:  In {{{HYBRID}}, we say that (in the general
>> case)
>> "the security community does not necessarily have as much confidence in
>> [the]
>> fundamental security" of the PQ key-exchange algorithms as it does in
>> (EC)DHE,
>> with the corresponding implication that (again, in the general case)
>> hybrid
>> constructions should be preferred over pure-PQ, at present.  In this
>> draft, we
>> promulgate some pure-PQ key-exchange algorithms with no commentary about
>> how
>> these specific algorithms relate to the general guidance in {{HYBRID}}
>> against
>> such algorithms, which appears to put the two documents in conflict; I am
>> claiming that we need to have some explicit text in this document to
>> resolve
>> the conflict with our other document (which, we recall, is not even an RFC
>> yet -- it's still in the RFC Editor's queue).
>>
>> I see at least three possibilities here: (1) ML-KEM falls into the
>> "though not
>> all" bucket of "many (though not all) post-quantum algorithms under
>> consideration are relatively new"; (2) the security community has changed
>> its
>> mind and has equivalent confidence in the fundamental security of at least
>> ML-KEM (if not other PQ algorithms) and the fundamental security of
>> (EC)DHE; or
>> (3) the security community retains its concerns in the general case but
>> some
>> use cases require non-hybrid/pure PQ even in the face of those concerns,
>> so we
>> provide pure-ML-KEM key-exchange solely for those limited use cases, with
>> the
>> general recommendation to use hybrids remaining in place.
>>
>> I don't think we're in (1).  I suppose that the (voluminous) ongoing WGLC
>> thread (I'm not fully caught up) is in a certain sense a debate about
>> whether
>> (2) holds, but IMHO we need fairly strong consensus in order to overturn a
>> preexisting WG consensus position, especially one so recently determined,
>> so I
>> believe that we are in case (3).  (If we're in (2), we should pull
>> draft-ietf-tls-hybrid-design from the RFC Editor's queue.) If we are
>> indeed in
>> case (3), I would have expected this document to include some text
>> acknowledging that the mechanisms in this draft are an exception to the
>> current
>> generic guidance and are only expected to be used in specific limited
>> scenarios.  Perhaps something like (including some existing text from this
>> document as transition/context):
>>
>> % Hybrid mechanisms provide security as long as at least one of the
>> component
>> % algorithms remains unbroken, such as combining quantum-resistant and
>> % traditional cryptographic assumptions. Standalone ML-KEM relies on
>> % lattice-based and hash function cryptographic assumptions for its
>> security.
>> % The sense of the security community recorded in {{HYBRID}} is that (due
>> in
>> % large part to their newness) the general level of confidence in PQ
>> algorithms
>> % is lower than the level of confidence in (EC)DHE algorithms as relates
>> to
>> % cryptanalysis in the absence of quantum computers, with the corollary
>> that
>> % hybrid constructions should be used in the absence of a particular
>> motivation
>> % to use a pure-PQ algorithm.  The use cases identified in {{motivation}}
>> % constitute some scenarios where there is a particular motivation to
>> avoid
>> % using a hybrid construction (though are not an exhaustive list).
>> Regardless, the
>> % decision to use a pure-PQ algorithm rather than a hybrid should be made
>> on a
>> % case-by-case basis; the generic recommendation remains to use a hybrid
>> % algorithm at the time of this writing.
>>
>> Additionally, I think there may be some subtlety around the new text
>> claiming
>> that non-reuse of the randomness input for ML-KEM implies non-reuse of
>> ML-KEM
>> ciphertexts, though -- a strict reading of this prohibition might, for
>> example,
>> come into conflict with the DTLS retransmission rules where we do need to
>> reuse
>> the ciphertext because we are logically retransmitting the packet rather
>> than
>> re-doing the cryptographic operation.  Probably we can get around this by
>> clarifying that such ciphertexts "MUST NOT be reused in a different
>> handshake".
>>
>> I also agree with other reviewers that we may want to do more to ensure
>> that the
>> security considerations for reuse of ephemeral key shares are sufficiently
>> prominent (whether via including them in this document or by specific
>> reference, though 8446bis §C.4 seems to only cover the tracking-vector
>> aspect
>> of things).
>>
>> Thanks,
>>
>> Ben
>>
>> [0]
>> https://github.com/tlswg/draft-ietf-tls-mlkem/compare/draft-ietf-tls-mlkem-05..main
>> [1]
>> https://mailarchive.ietf.org/arch/msg/tls/jKyjctDtgAo_tvbpC5Z2-nyW75I/
>>
>> _______________________________________________
>> TLS mailing list -- [email protected]
>> To unsubscribe send an email to [email protected]
>>
>
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to