All,
NIST has received a complaint regarding some of the text in our 2nd round report, NISTIR 8309. In particular, the concern centers on NIST "strongly encouraging" the teams that didn't have category 5 parameters to consider adding them. It was suggested that we should have sought public feedback for this encouragement. So, we would like to ask the submission teams (and the pqc community more generally) their input on this matter.
We want to make clear that adding category 5 parameters is not required, and the decision is left up to the submission teams. There are 15 submissions that were selected to advance to the 3rd round. Of these 15, there were 3 that did not claim category 5 parameters: BIKE, NTRUprime, and Dilithium. In addition, depending on the model, NTRU may lack category 5 parameters. We discussed each submission in more detail in the report. We also want to make it clear that having category 5 parameters (or not having them) did not affect any decisions as to submissions advancing (or not) to the third round.
NIST has not yet determined if it will standardize category 5 parameters. We suggested that submitters consider adding such parameters for a variety of reasons. As we've already stated on the forum, being able to add a parameter set that targets category 5 helps to demonstrate flexibility. We also believe there are use cases where users want very high security options (for instance, national security considerations), and consensus in the PQC community seems to be that it would be better for any new parameter sets to be added now rather than after round 3. We've seen several examples in the PQC process where schemes have been attacked. Having higher category parameters hedges against future breakthroughs in cryptanalysis and/or computing technology. In particular, a reason for wanting category 5 parameters is that it facilitates being able to more closely compare submissions. As almost all of the remaining submissions already had category 5 parameters, NIST wanted to encourage those who didn't have them to consider adding them. If the suggestion presents a difficulty to BIKE, NTRUprime, Dilithium, or NTRU, we would like to understand. The decision is always left to the submission teams.
If teams need more time than August 10th to let us know a summary of expected changes, they can contact us to discuss. We can be flexible.
Dustin
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-...@list.nist.gov.
I respectively disagree that “Category 5” parameters would be useful; in fact, I can see a scenario where they are actually harmful.
Suppose NIST does approve a “category 5” parameter set for some approved postquantum algorithm. In that case, some moderately clueless customers will demand that it be used rather than a more reasonable parameter set (after all, NIST approved it, hence NIST must think it’s required for security). We (as equipment manufacturers) will implement it, and the customers see that it doesn’t perform very well…, and so stick with RSA/ECC “which performs better”, even though a lower category parameter set would have performed just fine.
Furthermore, I would have to ask you: can you think of a plausible scenario (apart from a cryptographical advance) where a category 5 parameter set would be secure, but a category 3 parameter set would not be? I can’t think of one. As for the cavaet of “apart from a cryptographical advance”, well, if we posit such an advance, what assurance would we get that the advance is enough to endanger category 3, but not category 5.
IMHO, category 5 helps in only a moderately unlikely scenario, while at the same time would actively discourage some customers (the “moderately clueless ones” I referenced earlier) from using any postquantum algorithm.
From: pqc-...@list.nist.gov <pqc-...@list.nist.gov>
On Behalf Of Mike Gardiner
Sent: Thursday, August 13, 2020 5:48 PM
To: pqc-forum <pqc-...@list.nist.gov>
Subject: Re: [pqc-forum] Category 5 parameter sets
This discussion is bogged down by statements which may be technically correct but don't really change the fact that having category 5 parameters would be useful.
I don't have any insight into how NIST is going to choose. But as someone mostly concerned with the final product, I'm saying I'd like to see category 5 parameters in that standard and I'm not going to be alone on that. I'd like to see it discussed before the end of the competition because any tweaks after give me the heebie jeebies. Those trust issues also have me really wondering about the NSA endorsement of stateful hash based schemes given how easy they are to misuse.
The fact that AES256 gets cut down significantly by a quantum computer doesn't change the want for schemes that have good/better/best parameters in line with what we use in industry today. As for RSA.. we're kind of stuck with it at this point regardless of the actual security level. 2048 isn't too weak, and 4096 is the largest that's practical so I'm anxious for a standardized alternative that can get widely implemented/supported. ECC fumbled for a variety of reasons unrelated to how secure it actually is. The statements around transitioning to SuiteB not being very important due to an impending quantum computer hurt it just the fact it got conflated with the EC_DRBG mess by many not technical people just as the cryptographer position that there's too much unanswered by the parameters. So we have a whole bunch of national vanity curves and options many can't use because while they may be defacto, they aren't certified.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
pqc-forum+...@list.nist.gov.
To view this discussion on the web visit
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/f323a8dc-7538-436f-af57-63a536477a2fo%40list.nist.gov.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-...@list.nist.gov.
How confident are you that AES192 with your mode of choice would be up to the task given we know it will be at least weakened by half on the arrival of a sufficiently large quantum computer?