On Tue, Mar 03, 2026 at 10:51:27AM +0200, Ilari Liusvaara wrote:
> !-------------------------------------------------------------------|
>   This Message Is From an External Sender
>   This message came from outside your organization.
> |-------------------------------------------------------------------!
> 
> On Mon, Mar 02, 2026 at 01:46:20PM -0800, Benjamin Kaduk wrote:
> > On Fri, Feb 27, 2026 at 08:35:26PM -0500, Deirdre Connolly wrote:
> > >    This Message Is From an External Sender
> > >    This message came from outside your organization.
> > >     
> > >    Trying to pull this up to its own subject
> > > 
> > >    Here's a stab at more text around hybrid vs not-hybrid in Security
> > >    Considerations:
> > >    # Security Considerations {#security-considerations}
> > > 
> > >     This document defines standalone ML-KEM key establishment for TLS 1.3.
> > >     Hybrid key establishment mechanisms, which support combining a
> > >    post-quantum
> > >     algorithm with a traditional algorithm such as ECDH, are supported
> > >     generically via {{HYBRID}} with some concrete definitions in
> > >     {{ECDHE-MLKEM}}. Hybrid mechanisms provide security as long as at 
> > > least
> > >    one
> > >     of the component algorithms remains unbroken, such as combining
> > >     quantum-resistant and traditional cryptographic assumptions. 
> > > Standalone
> > >     ML-KEM relies on lattice-based and hash function cryptographic
> > >    assumptions
> > >    -for its security.
> > >    +for its security. Proponents of hybrid PQ/T key establishment 
> > > generally
> > >    +consider it a conservative approach to deployment of newer 
> > > post-quantum
> > >    +schemes alongside older traditional schemes, retaining at least the
> > >    security
> > >    +currently offered by traditional algorithms.
> > 
> > I think this is perhaps missing the point of my concern ... while I do think
> > that we should have more text in the security considerations about the
> > perception of relative risk between hybrid and non-hybrid PQ usage my
> > overarching concern is that the TLS WG needs to have a consistent overall
> > position for documents being published ~contemporaneously.  Which is to 
> > say, I
> > think we need to acknowledge that in {{HYBRID}} we are giving guidance that,
> > generally speaking, hybrids are preferred at present, and indicate why the
> > mechanisms in this document diverge from the general guidance, so as to 
> > place
> > the two documents in a consistent posture overall (presumably, by carving 
> > out a
> > specific subset of cases in which this document applies more specifically 
> > than
> > {{HYBRID}} does).
> 
> Maybe something along lines of:
> 
> 
> Since confidence in pre-quantum security of ML-KEM is much lower than
> that of ECC, one SHOULD use {{HYBRID}} cipher suites instead of these
> ones, unless:
> 
> - Following security profile standard, which can be blamed if things go
>   pear-shaped.
> - CRQC has rendered traditional cryptography moot.
> - One is in constrained environment, nevertheless needing post-quantum
>   protection, where hybrids would have not acceptable cost.
> 
> 
> The first one is to cover things like CNSA2, the second one is to cover
> things like ANSSI phase 3, and the third all manner of obscure IoT
> garbage (where someone breaking ML-KEM-512 is far from the worst
> security risk). And "much lower confidence" does not mean "low
> confidence". 

Yeah, something along those lines looks promising (John had a good point in the 
follow-up).
I am willing to put some time into drafting more polished text if we get some 
more buy-in.

Thanks for helping distill out the key facets here.

-Ben

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to