Hi all,
With the publication of the FIPS this morning, these algorithms are now available for algorithm validation certificates through the CAVP. This testing must be performed through an accredited testing lab. The CMVP is also ready for module submissions containing PQC algorithms.
Test vectors are available: https://github.com/usnistgov/ACVP-Server/tree/master/gen-val/json-files in the appropriately named folders.
Thanks,
Chris Celi
CAVP Program Manager
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/SA1PR09MB8669C8F8101747D31BB5C5C4E5862%40SA1PR09MB8669.namprd09.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CO6PR09MB7591C4327373942660753EA2F0862%40CO6PR09MB7591.namprd09.prod.outlook.com.
- For FIPS 203 / Kyber, the implementation of Algorithm 13 K-PKE.KeyGen() i.e. method K_Pke_KeyGen() seemingly does not implement the new "k" input or 33rd domain separation byte to the G function.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CA%2BiU_q%3DN5XQAvXGT8adDw4080OkCAe%3DUX8Zb%2B%3DH0WONhQ_pAkg%40mail.gmail.com.
Hi Markku,
Only the internal function is tested by the CAVP. Because of this, we do not test the pre-hash variation. For example, FIPS 204, the first paragraph in Section 5 and the first paragraph in Section 6.
Thanks,
Chris
Hi Markku,
Only the internal function is tested by the CAVP. Because of this, we do not test the pre-hash variation. For example, FIPS 204, the first paragraph in Section 5 and the first paragraph in Section 6.
I think it would save a lot of trouble if the actual ML-DSA and SLH-DSA signing and verification functions would be covered in testing too. Testing completely internal functions may be useful for debugging, but it does not give much assurance in relation to interoperability of implementations. For example, signature verification is completely deterministic and does not require randomness, so test vectors could be provided in straightforward way.
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/28730219.kyoqqv1GB0%40tauon.atsec.com.
Hi Adam,
You are correct on the ML-DSA KeyGen issue. We’ve put in a fix that should go out either later today or tomorrow. Another user on the forum pointed out a similar issue for ML-KEM KeyGen under K-PKE.KeyGen. In both cases, the matrix dimensions were added to the seed, then hashed to form the key material. This is different than the draft FIPS, but covered in Appendix C.2 in FIPS 203, and Appendix D.3 in FIPS 204.
Thanks,
Chris
From:
Adam Langley <a...@google.com>
Date: Tuesday, August 13, 2024 at 3:54 PM
To: pqc-forum <pqc-...@list.nist.gov>
Cc: Markku-Juhani O. Saarinen <mjos....@gmail.com>, pqc-forum <pqc-...@list.nist.gov>, Celi, Christopher T. (Fed) <christop...@nist.gov>
Subject: Re: [pqc-forum] Re: The first NIST PQC Standards are published!!
--
You received this message because you are subscribed to the Google Groups "pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pqc-forum+...@list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/SA1PR09MB8669741F875140766B082EF3E5862%40SA1PR09MB8669.namprd09.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CO6PR09MB7591C4327373942660753EA2F0862%40CO6PR09MB7591.namprd09.prod.outlook.com.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAMm%2BLwgcTmrkYLym8TiQ%3D9hEvVXDBD66CzVffpPhD3x%2BSimLvg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAMjbhoVx%2B9aVOp6%3DvbeP3m_uyg1EtwfipNJiEMaT26GL3yTfGw%40mail.gmail.com.
On 16 Aug 2024, at 09:33, BANDI RAVIKUMAR <band...@gmail.com> wrote:
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAJp5hbss8WWVVmvHCnW1rUZQDqt98rHPNTRALzCAexq%2BmzVVLQ%40mail.gmail.com.
Hi,
The NIST ACVTS Demo and Prod servers were updated yesterday with the fixes for domain separation on ML-DSA KeyGen and ML-KEM KeyGen. New vector sets can be requested from the API, or are available at https://github.com/usnistgov/ACVP-Server/tree/master/gen-val/json-files.
Thanks,
Chris
Yes this is definitely worthy of further discussion. There were many changes to input validation in FIPS 203 in relation to IPD, and the old Section 6 in the IPD was split into new Sections 6 and 7. These changes are easily ignored because they are not technically "functional." For example, the two-line Algorithm 21 ( ML-KEM.Decaps ) literally does nothing except call Algorithm 18 ( ML-KEM.Decaps_internal ) and return its value. The only difference is in the surrounding text, which discusses input validation.
However, my reading is that one doesn't have to do the checks every time, so it doesn't necessarily affect performance (Section 7.3 in FIPS 203): "However, checking of the decapsulation key need not be performed by the decapsulating party, nor with every execution of ML-KEM.Decaps. Instead, assurance that this check has been performed can be acquired through other means (see SP 800-227 [1])."
The referenced document SP 800-227 [1] does not exist (yet -- it is marked as "forthcoming" in re the references), so perhaps there is still an opportunity to still influence these aspects. And as we know, the IG document can be revised "dynamically" at any time. Samuel is right that the common use case of ephemeral key exchange needs to be explicitly discussed so that certification labs will know how to deal with it.
Ps. I can report that after the "hotfix" ( https://github.com/usnistgov/ACVP-Server/commit/65370b861b96efd30dfe0daae607bde26a78a5c8 ) I am able to match the CAVP test vectors with the specification for FIPS 203 / ML-KEM. Bas Westerbaan made a similar positive comment about the situation, but he can mention if there are caveats.
I'm still working on FIPS 204 / ML-DSA, but it is better now (ML-DSA test vectors were also modified by the fix). However the FIPS 204 specification, in turn, has errors ( https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/iwUz64oTOSo/m/nC_2W8lYBgAJ ) and the anyway test vectors don't yet cover the ML-DSA signing and verification functions yet (just the internal functions that "must not be used in applications" !). So, there is still some work to be done here before there is confidence to start "shipping products." Hopefully, this will now be accelerated as documents are out and public vetting of the testing system is ongoing.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/ac77dafc-0665-4a00-be5f-f6baac80618dn%40list.nist.gov.
I helped write some of the IG for self-tests mentioned here.
Pairwise consistency tests PCTs are a requirement from the ISO document that FIPS 140-3 references, especially surrounding asymmetric cryptography. It is not something introduced by this IG. The IG provides concrete steps to perform the PCTs for each individual algorithm.
Yes, we know it is very inconvenient and costly regarding time. There is no way around it, as it is the requirement from ISO. The requirement was brought up to the PQC Consortium hosted by the NCCoE, and also brought to the Crypto Module User Forum (CMUF), an open community of testing labs and interested vendors.
Regarding your questions on key import, I’ll pass that along to the Cryptographic Module Validation Program along with this thread.
Thanks,
Chris Celi
From:
'Samuel Lee' via pqc-forum <pqc-...@list.nist.gov>
Date: Friday, August 16, 2024 at 7:27
PM
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/ac77dafc-0665-4a00-be5f-f6baac80618dn%40list.nist.gov.
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/A4A457FC-714B-469B-9C4A-2891174A76A6%40googlemail.com.
Thanks Roderic,
I'm sorry for late replay.
I've also checked those vectors against ours (PQShield)
implementations. All vectors seems OK.
Kind regards,
Kris
To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/CAEseHRo%2B04k4VJCZGWe2a%3DuQSOeEy2qjOUnbbWnZbOC6Vpz7kA%40mail.gmail.com.

To view this discussion on the web visit https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/dc3723d7-ba7a-4ffd-a26d-128da3c8b3fc%40amongbytes.com.
Hi Eswari,
There are currently no tests for the validation of ML-KEM around null input checks. In general, null input checks fall within a gray area of crypto module testing. Is it the responsibility of the crypto algorithm implementation to check inputs, or the responsibility of the crypto module providing the inputs to check those inputs? At the moment, we would expect the FIPS testing lab to cover those requirements when submitting the crypto module to the CMVP. Is this the ideal solution? Certainly not. The way the standard is written leads to this testing being useful within the validation program. It may be something we add soon.
Thanks,
Chris Celi
CAVP Program Manager
From:
Eswari Devi N <ndevi...@gmail.com>
Date: Thursday, January 9, 2025 at 12:51
AM