Hi,
My understanding, based on [1], is that NIST (or the Secretary of Commerce, through the Director of NIST) within the next 28 days will release a first proposed timeline for the deprecation of quantum-vulnerable cryptography in standards. I think it is very good with more guidance on this topic, CNSA 2.0 only considers US national security systems.
I am looking forward to the anticipated revision of SP 800-57, but I assume the deprecation timeline might be a separate publication. In addition to the risk assessment of quantum attacks, hopefully based on something else than [2], I hope the deprecation timeline will take into consideration the use case (long-term confidentiality (50 years) of high-value targets is _very_ different from short-term authentication of low-value targets). And as explained in [3], the binding property of digital signatures for non-repudiation can be extended.
I would like to stress again that the current PQC standards are completely unusable for many constrained radio networks [4]. A requirement to deprecate ECC in these systems before the threat from quantum computers is imminent would significantly lower security by forcing them to switch to symmetric group keys and no perfect forward secrecy. I fully agree that other non-constrained systems should assume a conservative worst-case projection and mitigate accordingly.
If the deprecation timeline includes already deployed hardware, I hope the yearly timeline will consider the huge economical costs of replacing existing hardware.
In addition to a proposed timeline for the deprecation, it would be good with guidance on how store-now-decrypt-later attacks can be made harder to mount. If possible, communication channels should deploy fill signaling [3], continuously renegotiating of encryption
keys using ephemeral key exchange, and Fully Encrypted Protocols (FEP) making it hard to differentiate between key exchange and data encryption.
When NIST revises 800-57, I would like to see:
- A timeline for category 1. As there is no consensus on when Moore's law will cease to apply, it might be hard to decide on an end date for category 1, in that case it would be good with a statement like "> 2060" or something like that.
- Clearer explanation of Figure 2. I have numerous times seen people claiming that use of 112-bit security for encrypting data (irrespectively of the data lifetime) is NIST approved until 2030. My understanding of 800-57 is that 112-bit security can only be used to protect data that does not need to be protected after 2030. Many readers of 800-57 seems to _only_ look at Table 1. It would be good if lifetime was clearly included in Table 1.
- Incorporate the "migration time" as in Mosca's XYZ theorem. Just like quantum computing experts are (according to me) way too optimistic about when a quantum computer can break RSA-2048, most people are way too optimistic on how long time migrating to new crypto algorithms takes.
Cheers,
John Preuß Mattsson
Expert Cryptographic Algorithms and Security Protocols, Ericsson
[2] https://globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/
[3] http://kth.diva-portal.org/smash/get/diva2:1902626/FULLTEXT01.pdf
Hi Dan,
I agree with everything you say. I think most people agree with the goal of “moving the maximum number of systems off quantum-vulnerable cryptography”.
Very important that no country, including the US, prohibits ECC+PQC in any way. I think ECC+PQC should be recommended for most use cases. NSA and GCHQ have argued against hybrid systems. That might make sense for their use cases. Cryptographic implementations for national security systems are developed by teams where money is not an issue, and the implementations are then thoroughly analyzed by experts at NSA and GCHQ. I wish this was the case in all industries and consumer products but that it unfortunately not the case. Almost all attacks on cryptography targets the implementation, not the mathematical problem. We will likely not see any practical theoretical attacks on any of the standardized PQC algorithms. What we will see for certain is a lot of practical attacks on PQC implementations including side-channel attacks. Many attacks today are performed by nation-state cyber actors with huge resources. ECC+PQC is a very cheap insurance that protects against many attacks. For the same reasons the Five Eyes recommend memory safe programming languages, they should recommend hybrid schemes.
I disagree with NIST’s plan to not recommend for/against hybrid schemes. I think NIST and other governments should recommend industry and consumer systems to use hybrid schemes where possible.
Cheers,
John
Hi john, Dan, All
Thanks John,
for the heads-up about `depreciation timeline`.
After
elaborating <> scenario based on risks and my
understanding, I also do not see easily the rational to not
recommend to move to ECC+PQC. So if there is
please (ALL) let us know? we need to understand to drive the
strategy.
I think I understand the challenges with PKI (Hybrid, Chameleon or composite) from security/complexity point of view i.e. (EUF-CMA, Non -Separability)/ Impact of the change.
But if the
impact is `massive` what is the rational to not implement the
best of the controls and not recommend hybrid or composite?
I am
writing it quickly but I failed on Level of Assurance approach
to agree on PQC only. I landed on ECC+ PQC. The rational looks
to me like, we should do the best because the impact is High/
Very High. Means the cost of the impact is massive so we should
do the best to mitigate it.
I also think the 'NSS' wording might be confusing for other parties not in US. So if there is specific requirements for NSS and US may be they could be `quoted`/motivated/articulated.
'US' might
be only in the NIST's scope but for instance us in AU we do
follow so it would be awesome to get `guidance` with the
timeline depreciation notes...
Regards
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB967812501493BB50945B0B8889472%40GVXPR07MB9678.eurprd07.prod.outlook.com.
>is particularly difficult for products that aim to target both the NSS and enterprise spaces
It is also very difficult for products that aim to target both US and Europe. Most European governments say that hybrid is a must. With IETF, enterprise, European governments, and many industries going for hybrid, we will mainly do hybrid. We think hybrid is the right approach for most use cases. If you don’t like hybrid, you can see ECC as a non-security part of the implementation.
When we transition to PQC, we will also try to transition as much as possible to SHA-3/SHAKE/cSHAKE/KMAC. All ML-KEM and ML-DSA implementations implement SHA-3. SHA-3 is also much easier to protect against side-channel attacks. We think side-channel mitigation is important.
We will also transition to x25519, x448, Ed25519, and Ed448 as much as possible. Requiring public-key validation is not a robust design. There is a huge amount of impelentations that skip public-key validation.
Cheers,
John
From:
COSTA Graham <graham...@thalesgroup.com>
Date: Thursday, 17 October 2024 at 13:21
To: bruno <bruno.p...@gmail.com>, pqc-...@list.nist.gov <pqc-...@list.nist.gov>, John Mattsson <john.m...@ericsson.com>
Subject: RE: [pqc-forum] Re: Deprecation timeline for quantum-vulnerable cryptography
|
You don't often get email from graham...@thalesgroup.com. Learn why this is important |
THALES GROUP LIMITED DISTRIBUTION to email recipients
The CNSA 2.0 stance on ‘only’ PQC with no exceptions is particularly difficult for products that aim to target both the NSS and enterprise spaces. While we can often address this for protocols through crypto-agility and cipher suites for key establishment, features like code-signing present a real challenge if we are explicitly told that we’re not allowed to use ECC+PQC.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/63318607-4aeb-4279-ab06-709306d85a9f%40gmail.com.
When the industry was moving from becoming-vulnerable DES to AES - why wasn’t a “hybrid” spring proposed and insisted upon? Just super-encrypt (or pre-encrypt) with DES in addition to AES?—Regards,UriSecure Resilient Systems and TechnologiesMIT Lincoln LaboratoryOn Oct 17, 2024, at 06:50, bruno <bruno.p...@gmail.com> wrote:
This Message Is From an External SenderThis message came from outside the Laboratory.
THALES GROUP LIMITED DISTRIBUTION to email recipients
The CNSA 2.0 stance on ‘only’ PQC with no exceptions is particularly difficult for products that aim to target both the NSS and enterprise spaces. While we can often address this for protocols through crypto-agility and cipher suites for key establishment, features like code-signing present a real challenge if we are explicitly told that we’re not allowed to use ECC+PQC.
From: pqc-...@list.nist.gov <pqc-...@list.nist.gov>
On Behalf Of bruno
Sent: Thursday, October 17, 2024 11:49 AM
To: pqc-...@list.nist.gov; John Mattsson <john.m...@ericsson.com>
Subject: Re: [pqc-forum] Re: Deprecation timeline for quantum-vulnerable cryptography
Hi john, Dan, All
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/63318607-4aeb-4279-ab06-709306d85a9f%40gmail.com.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAFCMCNR71tuXpttjOukcfpt-Z2-Zu0JrunWrvGiwcCGYoLG4hA%40mail.gmail.com.
ZjQcmQRYFpfptBannerEnd
Also, the practical security of symmetric cryptography is better understood.
Agreed.
However, “better” does not mean “perfectly well”. Were there guarantees back then that AES won’t fall to a novel attack, e.g., side-channel?
A better question is why hybrids weren't used when moving to ECC.
And I’ve asked that one too, a while ago. With the same absence of a decent answer. 😉
Hi Uri, I think when AES became standardised DES was already broken. That s why i understand there was no need to have this safety hybrid period.
Oh no, not quite. Perhaps, I should’ve been more explicit/detailed – when DES showed weaknesses, Triple-DES was used in its place, and was widely believed to remain solid. But a hybrid solution that would involve it was not required.
May be this timeline depreciation is a good opportunity to explore further this topic (if in scope)?
Perhaps…?
Regards
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAMjbhoW_V-v9%2B4qMCLQBbN_xdaXR%2BYmpNO0yngieV_02Z53EGw%40mail.gmail.com.
It's likely a case of mandate. (Double envelope systems have trade-offs. Those trade-offs require optimization or at the very least a best-effort radar chart.)
NIST will release a migration document soon in accordance with National Security Memo 10, which John referenced. This initial document will outline key points for the migration from NIST’s point of view, but will not include firm dates for deprecation of quantum vulnerable algorithms (which will appear in a future revision of SP 800-131a).
NIST acknowledges the significant challenges involved in migrating the wide range of systems currently relying on public key cryptography. We understand that this transition will require considerable efforts across diverse applications and infrastructures, each with its own set of requirements and constraints.
This message marks the beginning of a broader conversation that we intend to have with industry partners, standards organizations, and relevant agencies. We aim to collaborate closely on the development of a clear approach and realistic timeline for migrating to post-quantum cryptography (PQC). Our objective is to ensure that this process is as smooth and coordinated as possible, balancing the urgency of adopting PQC with the need to minimize disruption across critical systems.
We appreciate your feedback on this topic.
Dustin Moody
NIST PQC
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/DA44C92C-0666-40FA-8704-711B15784FC2%40ll.mit.edu.
Deidre Connolly wrote:
> A theory: ECC was smaller than RSA/factoring, so going hybrid would have lost out on the primary advantage of ECC of far
>fewer bytes for the same level of security
100%
Tony Arcieri wrote:
>Deirdre noted that a hybrid RSA+ECC construction adds little over RSA alone because it still has all the disadvantages of RSA,
>which outweighs ECC's benefits. Both constructions are based on the same core problem, namely factoring and (EC)DLP
>respectively as different concrete examples of the hidden subgroup problem, and the big worry is finding a solution to one
>problem (such as the quantum threat of Shor's algorithm) breaks both systems.
>
>The case for a hybrid ECC+Lattice system is two different threats: hypothetical large quantum computers for ECC, and
>hypothetical lattice attacks for ML-KEM/ML-DSA. While you can argue the latter may not happen, if they do happen they aren't
>going to break ECC. Such a hybrid is robust in ways DES+AES or RSA+ECC are not.
My view is that the main reason to use hybrid schemes are not theoretical attacks but implementation bugs and weaknesses. I have seen deployments of threshold cryptography with RSA+ECC where the hybrid construction saved the day as one of algorithms had a faulty implementation. A hybrid scheme with X25519 or Ed25519 does not cost much and is an excellent defense-in-depth insurance. I think defense-in-depth should be a guiding principle for cybersecurity.
Cheers,
John
From:
Tony Arcieri <bas...@gmail.com>
Date: Friday, 18 October 2024 at 16:07
To: Blumenthal, Uri - 0553 - MITLL <u...@ll.mit.edu>
Cc: bruno <bruno.p...@gmail.com>, pqc-...@list.nist.gov <pqc-...@list.nist.gov>, John Mattsson <john.m...@ericsson.com>
Subject: Re: [EXT] Re: [pqc-forum] Re: Deprecation timeline for quantum-vulnerable cryptography
Deidre Connolly wrote:
> A theory: ECC was smaller than RSA/factoring, so going hybrid would have lost out on the primary advantage of ECC of far
>fewer bytes for the same level of security
100%
Tony Arcieri wrote:
>Deirdre noted that a hybrid RSA+ECC construction adds little over RSA alone because it still has all the disadvantages of RSA,
>which outweighs ECC's benefits. Both constructions are based on the same core problem, namely factoring and (EC)DLP
>respectively as different concrete examples of the hidden subgroup problem, and the big worry is finding a solution to one
>problem (such as the quantum threat of Shor's algorithm) breaks both systems.
>
>The case for a hybrid ECC+Lattice system is two different threats: hypothetical large quantum computers for ECC, and
>hypothetical lattice attacks for ML-KEM/ML-DSA. While you can argue the latter may not happen, if they do happen they aren't
>going to break ECC. Such a hybrid is robust in ways DES+AES or RSA+ECC are not.
My view is that the main reason to use hybrid schemes are not theoretical attacks but implementation bugs and weaknesses. I have seen deployments of threshold cryptography with RSA+ECC where the hybrid construction saved the day as one of algorithms had a faulty implementation. A hybrid scheme with X25519 or Ed25519 does not cost much and is an excellent defense-in-depth insurance. I think defense-in-depth should be a guiding principle for cybersecurity.
Cheers,
John
As someone who was involved in that transition, there are several rather obvious answers. One is that the threat to both was Moore’s Law, and doubling up on the same threat with both a new and an old defense makes less sense than when the threats to each algorithm are different. A second is that the performance ratios between algorithms were less different, which means feasibilities analyses often to very different answers (what is or is not feasible for various use cases and systems is a complicated space that still needs to be more fully explored). There were actually several clever ideas for how to make the DES to AES transition less painful that unfortunately we couldn’t take advantage of because of limitations of the capabilities of secure elements. That is one theme that looks like it is going to repeat itself, as the cryptographic capabilities of secure hardware are not where they need to be yet.
The idea that hybrid/composite shouldn’t be used for this transition because there are previous transitions where it wasn’t used is a great way to prevent anything new from ever happening, but beyond that, I’m not sure how much utility the observation has. New technology should be judged on it’s merits, not confronted with a “did we use it in the past?” strawman, which it will always inevitably fail.
-Tim
From: pqc-...@list.nist.gov <pqc-...@list.nist.gov> On Behalf Of Blumenthal, Uri - 0553 - MITLL
Sent: Thursday, October 17, 2024 7:58 AM
To: bruno <bruno.p...@gmail.com>
Cc: pqc-...@list.nist.gov; John Mattsson <john.m...@ericsson.com>
Subject: Re: [EXT] Re: [pqc-forum] Re: Deprecation timeline for quantum-vulnerable cryptography
When the industry was moving from becoming-vulnerable DES to AES - why wasn’t a “hybrid” spring proposed and insisted upon? Just super-encrypt (or pre-encrypt) with DES in addition to AES?
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/DA44C92C-0666-40FA-8704-711B15784FC2%40ll.mit.edu.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/610aa6da-99c6-4f9b-ab6d-0ca7e3d150e2n%40list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/GVXPR07MB96781E5B6944E781434D482789402%40GVXPR07MB9678.eurprd07.prod.outlook.com.
"My view is that the main reason to use hybrid schemes are not theoretical attacks but implementation bugs and weaknesses."
Just make sure the extended set of code you've introduced, doing your KEX/KEM combining, doesn't have its own implementation bugs and weaknesses!
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAPxHsS%2BHq9GcBWPiHGgj-p01zSw%2BK-8K7oqm2mrpwpkukHewPw%40mail.gmail.com.
Hi all,
may be we should change the topic (not deprecation timeline) to
share ideas on hybrid?
Below my mindset
- For KEM (in openssh or tls with browsers as example) hybrid has
been used without explicitly composite keys structure. the outcome
turn to be similar with an `hybrid` share. The cost of
implementing the control is low so the outcome was a given.
- For digital signature and PKI, this is more complex and
deploying trust is hard. When we talk about hybrid we have (if
not doing errors) 3 options: hybrid with a x509 extension, hybrid
with Chameleon, Composite. Only Composite provides a strong dual
protection bounded to one CA. I came to the point that Composite
allows minimal/no change in protocols. IMHO it is more secure,
easier than the other `hybrid`. i have also thought on chameleon
or hybrid (with extension) that require changes in protocols and
are quiet complex with security element to be discussed (critical
extension that can be ignored or base certificate type -(from my
internal notes). “In hybrid the critical extension should be the
PQC and in Chameleon the base should be the non PQC)”. May be you
have other references that i missed but i found [1] interesting
about the security topic.
That said currently my preference is composite. I think this is
brillant if i am understanding correctly the impact.
- in the future, we could still use ML-DSA + PQC2 when we have
another non lattice PQC2 scheme. We should be agile and
implementing now hybrid is in my opinion an advantage for the
future. By doing so, means we are able to manage multiple root of
trust and shift when need. I think all will be rotating faster and
faster so we should prepare to transition more easily that we can
today..
All what i am reading add real value to me. I think this looks
like a risk appetite discussion to balance security/complexity
(cost, delay, risks). risk appetite often change and we are
adapting :)
[1] https://eprint.iacr.org/2017/460.pdf
regards