Hi Mathilde,
I think there has been many more transitions. E.g., DES to 3DES, 3DES to AES, AES-CBC to AES-GCM, SHA-1 to SHA-256, No-PFS to PFS, and RSA/FFDH to ECC.
- Cloudflare’s blog from February 2024 says that TLS 1.3 is used by more than 93% of the connections. Figure 14.5 in the Web Almanac states that 97% of requests support perfect forward secrecy. There are however still much more to do in the migration to PFS, e.g., key agreement in 5G. The lack of PFS in AKA means that a SIGINT agency with access to SIM keys can passively eavesdrop on all mobile phone calls for these keys. Unfortunately, the proposal to address this significant weakness was objected by organizations from France, UK, and US. No technical reasons were given. Support from Swedish, Finish, Chinese, German, and US organizations.
- Cryptographic migrations often take much longer than 12-15 years. It is common with hardware with lifetimes of 20 years that simply cannot be updated. Root-of-trusts for e.g., firmware update can often not be changed and a device with hardware acceleration of algorithm A can typically not migrate to algorithm B without unacceptable performance loss. Complying with NISTIR 8547 means that almost all existing hardware and most hardware deployed in the next few years will have to be replaced.
- Dual_EC_DRNG had truly horrible effects. After Suite B went all in for ECC, many industries planned for a migration from RSA/FFDH to ECC. One example is mobile systems where I helped driving the decision to introduce and recommend ECC everywhere. Dual_EC_DRNG unfortunately led to huge uncertainty regarding ECC in general, significantly delaying migration, and sometime making it go backwards. I have seen examples of implementations reading about Dual_EC_DRNG (or reading safecurves.cr.yp.to) and then turning off ECC even if the only other thing supported was FFDH-1024 and RSA-1024 (and not the good kind of FFDH-1024 and RSA-1024). I think the increased use of encryption following Snowden (who recently swore an oath of allegiance to Russia) led to more focus on high performance cryptography, which helped migration to AES, AES-GCM, and ECC. I have also heard stories of products using no encryption rather than encryption with Simon/Speck, which sometimes is the only ciphers with acceptable performance. I hope the lesson for SIGINTs are “Don’t intentionally weaken cybersecurity systems”, but I fear the lesson likely is “Don’t get caught”.
Cheers,
John
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
pqc-forum+...@list.nist.gov.
To view this discussion visit
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/-mHtgYQ9SA-9STTK-Vf380Jy2vEZzFA5sPUaHXt7kPUqHq2l_CJehBQC9spj8F9Vc-narI5J90lgdFXau_nxxm7OUBwroYi3buCszMDmGvc%3D%40protonmail.com.
Simo Sorce wrote:
>And RC2 -> RC4 -> No more stream ciphers
Yes RC4 was used quite a lot, but RC4 was not at all the end of stream ciphers. SNOW 3G, SNOW 5G, ZUC, and ZUC-256 are specified for use in mobile networks and ChaCha20 is very popular in a lot of different use cases. Nothing wrong with stream ciphers. The confidentiality advantages for SNOW 5G and ChaCha20 are much better than for AES-256-GCM.
Cheers,
John
NIST has been extremely active also when it comes to symmetric cryptography. Thanks for that! In addition to Ascon, NIST is also planning discussing/planning standardizing
of Rijndael-256-256, a Keccak AEAD, Accordions, and Accordion derived functions.
https://csrc.nist.gov/csrc/media/Presentations/2024/options-for-encryption-algorithms-and-modes/images-media/sess-3-regenscheid-acm-workshop-2024.pdf
https://csrc.nist.gov/news/2024/proposal-to-update-fips-202-and-revise-sp-800-185
https://csrc.nist.gov/files/pubs/other/2024/04/10/proposal-of-requirements-for-an-accordion-mode-dis/iprd/docs/proposal-of-requirements-for-an-accordion-mode-discussion-draft.pdf
I wholeheartedly welcome all of these initiatives. We need a backup to AES, algorithms with better properties, and algorithms with better which are not so easy to shoot yourself in the foot with.
Cheers,
John
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
Q R <amz...@gmail.com> wrote
>Are the Ascon ciphers quantum - safe?
All symmetric crypto is quantum-safe. The idea that symmetric cryptography will be practically affected by CRQCs is a misconception. While classical supercomputers might be able to brute force AES-128 around the year 2090, a huge cluster of one billion CRQCs (according to one estimate costing one billion USD each) would take a million years of uninterrupted calculation to find a single AES-128 key. The qubits would take up the surface area of the moon. Algorithms with quadratic (n2) speedup like Grover’s algorithm (which is proven to be optimal) will not provide any practical quantum advantage for breaking symmetric cryptography and likely not for any other problems.
Most other 128-bit algorithms such as SNOW 3G, ZUC, TUAK, KMAC128, Ascon, etc. are likely to have similar quantum overhead for Grover’s algorithm which is known to be
optimal. Even if an algorithm has slightly lower quantum overhead than AES-128, the algorithm would still fulfill the requirement (comparable to key search on AES-128) for quantum resistance category 1.
IETF Statement on Quantum Safe Cryptographic Protocol Inventory
https://datatracker.ietf.org/liaison/1942/
3GPP Statement on PQC Migration
https://www.3gpp.org/ftp/tsg_sa/WG3_Security/TSGS3_118_Hyderabad/docs/S3-244307.zip
Sam Jaques, “Quantum Attacks on AES”
https://www.youtube.com/watch?v=eB4po9Br1YY&t=3227s
Oh, Jang, Baksi, Seo, “Depth-Optimized Implementation of ASCON Quantum Circuit”
https://eprint.iacr.org/2023/1030.pdf
Cheers,
John
From:
pqc-...@list.nist.gov <pqc-...@list.nist.gov> on behalf of Q R <amz...@gmail.com>
Date: Thursday, 5 December 2024 at 16:38
To: Scott Fluhrer (sfluhrer) <sflu...@cisco.com>
Cc: Simo Sorce <si...@redhat.com>, mathilde.chenu <mathild...@protonmail.com>, pqc-...@list.nist.gov <pqc-...@list.nist.gov>
Subject: Re: [pqc-forum] Lessons learnt from previous migrations
|
You don't often get email from amz...@gmail.com. Learn why this is important |
Mathilde Chenu wrote:
>@John: you mentioned that Dual_ECC convinced some players *not* to use other safe and sound ECC-based protocols. Is there any evidence, from your personal experience or from the literature,
that the attacks on SIKE had the same 'brake' effect on the PQC migration for industries? Or did it rather encourage them towards hybridization and/or crypto-agility (let's be hopeful)?
I don’t think SIKE being broken had a huge practical effect, but yes, I would say that the attacks on SIKE and Rainbow likely encouraged/will encourage hybridization. Other things that have been driving industry to use more hybridization is bugs and side-channels in implementations, requirements from European governments, and NISTIR 8547. Before NISTIR 8547 many industries were planning to do prioritization between different use cases, different protection lifetimes, and different value of the proteced data/item. Systems migrated later when implementations have been hardened could likely have used standalone ML-KEM and ML-DSA, but the broad-brush approach required by NISTIR 8547 will likely lead to much more hybridization. And once hybridization is used, I am sceptical to if it will ever be removed. You need strong reasons to change things.
I was very positive to NIST including SIKE in later rounds to foster reasearch into Isogeny-based cryptography and KEMs with compact public keys and ciphertexts but we did not have any plans to use SIKE anytime soon. We typically only use algorithms after they are specified by NIST, IETF/IRTF, and ETSI SAGE. . I kind of agree with Shamir that said that you should wait at least 20 years, and isogeny-based cryptography was invented in 2011. Isogeny-based crypto is also a bit too slow to be useful in practice. The biggest impact of the SIKE attack was that it provided a lot of idea to isogeny research which is once again a very hot topic. I relly like Wouter CastryckOne talk at Eurocrypt https://www.youtube.com/watch?v=CpqjkfuXeoQ
We are perfectly fine with using algorithms such as ChaCha20 specified by CFRG but not NIST. One exception is LMS and XMSS were we considered using using the CFRG specs until NIST standardized and forbid key export. Using LMS or XMSS and not being compliant with NIST requirements would have looked bad.
Cheers,
John