I don’t know if it’s THE authoritative definition, but in the Call for Proposals from December 2016, so the start of the whole process,
Submission Requirements and Evaluation Criteria
for the Post-Quantum Cryptography Standardization Process
you can find 4.A.5 Security Strength Categories
with the five categories.
Best,
Torsten
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
pqc-forum+...@list.nist.gov.
To view this discussion on the web visit
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAMm%2BLwhtFERXFW7yDmtwL%3D6%3DidXQ7QEeHu9vZBZb6Cr5qxpsmg%40mail.gmail.com.
Hey Phillip,
I fully agree!
Since FIPS 203 / 204 are full of references to “Category 1 / 2 / 3 / 4 / 5”, but those are not actually defined in the referenced section 5.6 of SP 800-57pt1r5.
The definitions are in section 4.A.5 of this web page, which is part of the Call for Proposals from the beginning of the PQC competition.
I’m a little surprised that this important info didn’t make it into any official FIPS or SP document.
---
Mike Ounsworth
From: pqc-...@list.nist.gov <pqc-...@list.nist.gov> On Behalf Of Phillip Hallam-Baker
Sent: Friday, September 13, 2024 3:09 PM
To: pqc-forum <pqc-...@list.nist.gov>
--
Thanks Dustin!
In the meantime, I wonder if there is something you can do to make the security category definitions easier to find? It always takes me at least 10 minutes to dig up the call-for-proposals doc on google, and I generally know where to look.
Could you maybe put a link to the call-for-proposals page on the FIPS 203 / 204 / 205 landing pages?
https://csrc.nist.gov/pubs/fips/204/final
I’m thinking an entry on the “Supplemental Material” sidebar with a link called “Security Categories defined in Call for Proposals Security Criteria".
---
Mike Ounsworth
Hi Brent,
The “security categories” that we’re talking about with respect to the NIST post-quantum primitives have the following definitions [1], they could apply to any type of application-level security property (availability, integrity, or confidentiality), depending on how the cryptographic primitive is used within the application.
“””
NIST will define a separate category for each of the following security requirements (listed in order of increasing strength2):
“”
---
Mike Ounsworth
From: 'Brent Kimberley' via pqc-forum <pqc-...@list.nist.gov>
Sent: Sunday, September 15, 2024 12:28 PM
To: Phillip Hallam-Baker <ph...@hallambaker.com>; pqc-forum <pqc-...@list.nist.gov>
Subject: [EXTERNAL] Re: [pqc-forum] security category reference
When i hear the term security category, I tend to think of things like the degree of injury that could (reasonably?) be expected - considering , but not limited issues such as loss of availability, integrity, or confidentiality. From: pqc-forum@ list. nist. gov
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/YT3PR01MB10544399347A4417D1C1F526CFA672%40YT3PR01MB10544.CANPRD01.PROD.OUTLOOK.COM.
Hi,
I was also a bit suprised that there is no definition of the security categories in the final documents. I agree that having it in supplementatary matererial would be good until SP 800-57 is revised.
Not sure linking to the "call of proposals" is the best option. The call of proposal is 7 years old and not very relevant after the submission deadline. I think it would might be better if NIST linked to Appendix A in the draft versions.
In the SP 800-57 revision I think NIST should:
- Add MAXDEPTH also for classical gates.
- Explain that other symmetric algorithms with 128-bit keys might have slightly smaller circuits than AES-128 but would still be category 1 as attacks require computational resources _comparable_ with key search on AES-128.
- Align some of the text with the IETF statement in https://datatracker.ietf.org/liaison/1942/
Cheers,
John
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CH0PR11MB5739168B4E84140BE534D7DC9F672%40CH0PR11MB5739.namprd11.prod.outlook.com.
>- Explain that other symmetric algorithms with 128-bit keys might have slightly smaller >circuits than AES-128 but would still be category 1 as attacks require computational >resources _comparable_ with key search on AES-128.
Regarding this, has any done analysis of Ascon and KMAC128? My guess would be that they require more gates than AES-128.
Cheers,
John
has any done analysis of Ascon and KMAC128? My guess would be that they require more gates than AES-128.
Sebastien Riou
Director, Product Security Architecture
PQShield Ltd
M: +33 782 320 285
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB967842113D7A291B5BA962A189602%40GVXPR07MB9678.eurprd07.prod.outlook.com.
'Friedrich Wiemer wrote:
>For a quantum cryptanalysis attack, I don't need to implement the primitive with side >channel measures, do I?
No definitely not. For some algorithms you might even be able to use a non-compatible implementation that skips some corner cases.
Cheers,
John Preuß Mattsson
Sebastien Riou
Director, Product Security Architecture
PQShield Ltd
M: +33 782 320 285
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB967842113D7A291B5BA962A189602%40GVXPR07MB9678.eurprd07.prod.outlook.com.