On Sun, Mar 22, 2026 at 12:04:33AM +0000, John Mattsson wrote:

> That this is explicitly permitted by RFC 8446 is a major part of the
> problem, and exactly why the TLS WG has a responsibility to respond.
> RFC 8446 allows a mode that is dangerously weak in practice: it allows
> people not only to shoot themselves in the foot by using low-entropy
> PSKs (e.g., passwords), but also creates a clear path for compromise,
> including SIGINT actors marketing hardware that magically produces
> "unbreakable" PSKs.

It makes sense to recommend "psk_dhe_ke" over "psk_ke", with
X25519MLKEM768 as the "dhe".  And perhaps also suggest a correction for
the text in section 10.1:

  Old:

    TLS supports three basic key exchange modes [IETF RFC8446]:
    - (EC)DHE (Diffie-Hellman over either finite fields or elliptic curves)
    - PSK (Pre-shared Key)-only
    - PSK with (EC)DHE

  New:

    TLS 1.3 supports three basic key exchange modes [IETF RFC8446]:
    - Asymmetric key establishment ((EC)DHE, KEM, or Hybrid)
        * KEMs presently include:
            + MLKEM512
            + MLKEM768
            + MLKEM1024
        * Hybrids presently include:
            + SecP256r1MLKEM768
            + X25519MLKEM768
            + SecP384r1MLKEM1024
            + curveSM2MLKEM768
    - PSK (Pre-shared Key)-only ("psk_ke")
    - PSK with asymmetric key establishment ("psk_dhe_ke")

An astute reader might notice that QKD is then not the only game in town
for post-quantum security and becomes a defense in depth option, when
risk-appropriate and cost-effective.

-- 
    Viktor.  🇺🇦 Слава Україні!

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to