Dear All,
The key-derivation methods described in NIST SP 800-56C are currently only applicable to shared secrets established during a key establishment scheme as specified in NIST SP 80056A or 800-56B, or to Z = Z’||T which is the combination of shared secret Z’ that was generated as specified in SP 800-56A or -56B with another shared secret T that is generated in any way. As previously stated, NIST intends to allow all key-derivation methods in NIST SP 800-56C to apply to the outputs of the ML-KEM key establishment scheme specified in FIPS 203.
Further, NIST intends to allow the 800-56C key derivation methods to apply to shared secrets of the form Z = T || Z’, where T and Z’ are as described above but in reverse order. That is, we will ensure that either order is allowed for FIPS validation in upcoming revisions to -56C. Note, however, that the order of the shared secrets will need to be specified at the protocol level to avoid confusion. We are working on guidance to ensure that this reordering will not introduce security vulnerabilities. NIST is open to feedback on the matter.
Angela
NIST PQC
Great,
Thank you Angela, that is definitely a
good news for protocol designers.
Kind regards,
Kris
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CO6PR09MB797555BA77527376183DDF1C8E202%40CO6PR09MB7975.namprd09.prod.outlook.com.
Thank you Angela! This is excellent!
> We are working on guidance to ensure that this reordering will not introduce security vulnerabilities. NIST is open to feedback on the matter.
I will put my thinking into writing so that others may comment on it.
My understanding is that KDF(T || Z || …) is a security concern when T is completely uncontrolled … ie content and length are completely controlled by the attacker. In particular, the lowest common denominator allowed by SP 800-56Cr2 is the One-Pass (section 4) Option 1 with a single iteration of SHA2 as the KDF, but that stronger KDFs such as HMAC-SHA2 or SHA3 do not suffer from these attacks (though I am not exactly certain what the attack here is). You need some “guardrails”. Some ideas that I have heard: Disallow bare SHA2 in this reversed construction. Require applications to length-tag the input. Only allow the reversed construction when T is “well behaved” for some definition of “well behaved” (fixed-length is probably sufficient).
If there are other security implications here, it would be helpful to put them on the list so that multiple minds can work on the problem.
---
Mike Ounsworth
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/5cc283ef-a216-4949-a8d9-30a4c66e035f%40amongbytes.com.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAFR824w00cf_z%2BiaU7pp5XaK951iyAUwY-BD_NwdH_N_OSuW1w%40mail.gmail.com.
There is no such thing as KMAC-SHA2. KMAC is based on SHA3, see https://csrc.nist.gov/pubs/sp/800/185/final
Falko
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAEEbLAaRdwdq27R8JOLE1PyqqUXmXOY5C5BeyHLv99Qzc05pGw%40mail.gmail.com.
MTG
AG
Dr. Falko Strenzke
Phone: +49
6151 8000 24
E-Mail: falko.s...@mtg.de
Web: mtg.de
MTG AG - Dolivostr. 11 - 64293 Darmstadt, Germany
Commercial register: HRB 8901
Register Court: Amtsgericht Darmstadt
Management Board: Jürgen Ruf (CEO), Tamer Kemeröz
Chairman of the Supervisory Board: Dr. Thomas Milde
This email may contain confidential and/or privileged
information. If you are not the correct recipient or have
received this email in error,
please inform the sender immediately and delete this
email.Unauthorised copying or distribution of this email is
not permitted.
Data protection information: Privacy policy
Hi,
FYI, Ericsson sent the following comment to NIST on the SP 800-56 Subseries
https://emanjon.github.io/NIST-comments/2025%20-%20SP%20800-56%20Subseries.pdf
Some of the comments/suggestions:
Cheers,
John Preuß Mattsson,