On 25 Mar 2025, at 00:08, 'Samuel Lee' via pqc-forum <pqc-...@list.nist.gov> wrote:
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/783377e2-68d8-4668-9428-08cb14b47d84n%40list.nist.gov.
|
You don't often get email from si...@hoerder.net.
Learn why this is important
|
ZjQcmQRYFpfptBannerEnd
If I'm reading this right, I don't see the need for dropping the expanded private key elements from the format.
I don’t see the need to keep in the format something that is unnecessary.
The simpler (and shorter/smaller) – the better.
|
You don't often get email from fran...@vialprado.com.
Learn why this is important
|
So, IMO, the externally visible private key format for exchange between modules may as well be small and not have redundancy (i.e. just seed). Similarly, we do not standardize the way to serialize AES key schedules between modules.
Implementations that want to serialize expanded keys for their own operation and reuse can make module-specific tradeoffs for how much to expand or not.
Best,
Sam
________________________________________
From: pqc-...@list.nist.gov on behalf of D. J. Bernstein
Sent: Tuesday, March 25, 2025 13:29
To: pqc-...@list.nist.gov
Subject: Re: [EXTERNAL] Re: [pqc-forum] ML-KEM / ML-DSA expanded key formats and trapdoors
'Samuel Lee (ENS/Crypto)' via pqc-forum writes:
https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/lMTIIPu9yDY/m/BeQXJi2qAAAJ
---D. J. Bernstein
--
You received this message because you are subscribed to a topic in the Google Groups "pqc-forum" group.
To unsubscribe from this topic, visit https://groups.google.com/a/list.nist.gov/d/topic/pqc-forum/gaHWR-Fs3yQ/unsubscribe.
To unsubscribe from this group and all its topics, send an email to pqc-forum+...@list.nist.gov.
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/20250325202925.1483071.qmail%40cr.yp.to.
Hi, I think agree that this is a new threat vector and also think
that we rely on certification and the source code. I think this is
also valid for HSM in particular ML-DSA RoT.
It is likely also to be a supply chain attack risk discussion.
May i add to that point that there is a concern on the diversity of HSM in the cloud since it looks like one actor is doing most cryptography operation (namely Cavium/Marvell)?
I apologize to share one of my old concerns but may be this could be relevant? and i did not see any controls to mitigate that.
I am happy to be wrong.
Thanks
[2] https://cloud.google.com/kms/docs/attest-key
[3] https://docs.aws.amazon.com/cloudhsm/latest/userguide/cloudhsm_mgmt_util-getHSMInfo.html
[4] https://docs.microsoft.com/en-us/azure/key-vault/managed-hsm/overview
To view this discussion visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/D8F11D83-4C35-4811-871F-14F091033CAF%40hoerder.net.