Op 14 apr 2026, om 00:52 heeft Demi Marie Obenour <demio...@gmail.com> het volgende geschreven:Certain applications don't require IND-CCA security, only IND-CPA.
Furthermore, some of them (like WireGuard) need to fit everything in a
single UDP packet. If one needs to fit a Classic McEliece ciphertext
and a KEM ciphertext in a UDP packet, the only currently-standardized
algorithm that fits is ML-KEM-512.
However, browsers are currently using ML-KEM-768 for TLS, presumably
because it has more margin against advances in cryptanalysis.
Using weaker cryptography in a VPN seems rather risky.
The original post-quantum WireGuard paper [1] proposed a KEM they
called Dagger. It's a modified Saber with a harder lattice problem
but much higher decryption failure rate. However, decryption failures
are not a problem for UDP-based applications using ephemeral keys.
They are handled just like a dropped UDP packet.
Should there be algorithms that are designed for this purpose? At a
minimum, an IND-1CCA version of ML-KEM is sufficient for ephemeral
keys, easy to implement [2], and faster. Or should anything that
needs to fit in an MTU settle for a two-round handshake? That would
be less than desirable for obvious reasons.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
<OpenPGP_0xB288B55FFF9C22C1.asc>--
Pqc mailing list -- p...@ietf.org
To unsubscribe send an email to pqc-...@ietf.org
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/EB7275D3-0A8C-485D-9B91-C2A909889300%40thomwiggers.nl.
Op 14 apr 2026, om 16:20 heeft Denise L. Davis <dld...@DUIT.us> het volgende geschreven:Thom and Demi,The debate over IND-CPA and MTU constraints is irrelevant if the goal is compliance with CNSA 2.0. The NSA has explicitly signaled that operational efficiency will be sacrificed for cryptographic margin. By mandating ML-KEM-1024, they have accepted that 1-RTT, non-fragmented handshakes are essentially over for National Security Systems (NSS). Any attempt to "optimize" for the MTU by using IND-CPA or lower security levels (Level 1 or 3) is a non-starter for regulated environments.However, if the goal is to standardize PQC for the broader internet, we cannot ignore the MTU bottleneck. We should not be forced to choose between the insufficient security margin of ML-KEM-512 or the overhead of 2-RTT just to satisfy a "misuse-resistance" requirement that is logically irrelevant to ephemeral, 1-RTT protocols.To be clear, I am not merely suggesting we strip the FO transform which provides negligible size savings. I am asking if there is a path for a High-Compression/High-DFR ML-KEM profile that optimizes the internal parameter set (k, η, du, dv) specifically for 1-RTT constrained networking.The current FIPS 203 parameters are tuned for a DFR that is overkill for ephemeral use. By relaxing the DFR to a level consistent with standard UDP packet loss (e.g., 2-30), we can achieve the ciphertext compression necessary to fit ML-KEM-768 and a classical hybrid within a 1280-byte MTU.Does the community want to maintain the fiction that "one size fits all" for KEMs, or are we willing to define a profile that actually works for high-performance networking?Best,Denise L. Davis, DUITD.Eng. Candidate, Johns Hopkins Whiting School of EngineeringM.S. Applied & Computational MathematicsFocus: Post-Quantum Cryptography & Implementation MetrologyCo-Owner | Founder | CEOCertified ScrumMaster®SBA certified EDWOSB/WOSB8(a) Small Disadvantage Business ParticipantGSA STARS III GWACWe have moved!!! NEW Address:
Address: 1730 Twin Spring Rd, Suite 211Baltimore, MD 21227Tel: 301.637.5411 | Fax: 301.637.5412Cell: 301.275.1956 | Toll Free: 1.844.NOW.DUITEmail: dld...@duit.us | Website: http://duit.usCONFIDENTIALITY AND DISCLAIMER NOTICE: This e-mail message and any attachment(s) from Davis Unlimited Information Technologies, Inc. (DUIT) is intended for the sole use of the recipient(s) and may contain confidential and privileged information. Any unauthorized disclosure, reproduction, distribution or the taking of action in reliance on the contents of the information is prohibited, unless so authorized by DUIT. If you believe that you have received the message in error, please notify the sender by reply transmission and delete the message without copying or disclosing it.From: Thom Wiggers <th...@thomwiggers.nl>
Sent: Tuesday, April 14, 2026 9:17 AM
To: Demi Marie Obenour <demio...@gmail.com>
Cc: pqc-...@list.nist.gov <pqc-...@list.nist.gov>; p...@ietf.org <p...@ietf.org>
Subject: [Pqc] Re: IND-CPA *only* KEMs