For discussion of the feasibility of using BRSKI in a very constrained environment (specifically, LoRaWAN), please see M. Hatami, S. Céspedes, J. Atwood, "A Framework for Secure Autonomic IoT Device Management in Constrained Networks", in Proceedings of the Applied Networking Research Workshop 2025, Madrid, Spain, 2025-07-22. https://doi.org/10.1145/3744200.3744775 You may also want to look at the associated thesis by M. Hatami, at Concordia University (visit https://spectrum.concordia.ca/).

This work is focused on defining a framework for, and demonstrating the feasibility of, establishing a secure management and (user) data path into constrained devices (using BRSKI and a voucher; see below). It does not discuss the effect of PQ crypto, but (as is pointed out below) there is a good likelihood that PQ crypto will not be needed anyway, in these environments.


On 2026-03-06 2:56 p.m., Toerless Eckert wrote:
Attention This email originates from outside the concordia.ca domain. // Ce 
courriel provient de l'extérieur du domaine de concordia.ca

Adding anima

[ Demi: next time, when you move a thread from one WG/RG to another one, please
   include an explicit bread crumb where you came from, so folks in the new 
mailing
   list will know where to look for the origin of the thread. Luckily, IETF mail
   archive search was good enough to allow me to find that this all originated
   from CFRG thread "Current status of group-action based cryptography". ]

The IETF ANIMA WG standardized secure bootstrap mechanism BRSKI (RFC8995) and
a range of variations do hopefully resolve a good amount of the challenges
that John lists in his original email appended below.

Yes, the root problem of secure bootstrap "on-site" with minimum amount of
touch is for who or whatever does the enrolment to have some form of credential
to allow authentication for enrolment by the factory state device. We've
defined a generic, extensible artefact format for this problem called the
voucher (RFC8366, -bis currently in WG). It can go all the way down to
a bearer token, but preferred option is some pledge-manufacturer signed
owner certificate. Pledge of course has cert of its manufacturer.

Now, i just posted to CFRG the provocative claim that these bootstrap
protocols themselves likely do not need PG crypto because there is not
relevant PQ attack vector. Would love that challenge to get some answers -
either way.

But whether or not PK like ML-KEM is reasonable is not primarily a question
of bootstrap i think. It is primarily a question whether a device could
handle through its life cycle the added bitrate of PQ crypto exchanges.
After all: Why bootstrap devices into PQ crypto material if they can't use
it afterwards.

Of course there is always some type of constrained environment (nodes/devices)
that will have problem with anything you throw at it. But when it comes to
current IETF work focus, you probably want to go to DRIP for those with
the most challenging constraints (messaging to drones often likely via bluetooth
BLE in as few messages as possible).

When it comes to the most common building automation or industrial networking
environments as well as home networks, i think 802.15.4 derived mesh
networks like ZigBee/Thread are a good reference for low-end wireless.
These mesh networks typically deliver 256kbps raw or 20kbps end-to-end.
So i really don't see an issue to bootstrap into PQ. After enrolment,
these devices then typically only use symmetric keys.

I am not sure what the case of "millions of devices" would be that John
is referring to. But feel free to ask followup questions.

Cheers
     Toerless

On Fri, Mar 06, 2026 at 03:09:44AM -0500, Demi Marie Obenour wrote:
On 3/6/26 02:44, John Mattsson wrote:
Hi Demi,

The operational aspects are probably better discussed in venues such
as IOTOPS. There are many practical challenges. Bootstrapping during
manufacturing is often too inflexible. Secure on-site bootstrapping
using a relay requires the device to support a second network
technology and requires the installer to carry special equipment and,
in remote locations, a portable Internet connection. Even when it
works, the the devices becomes significantly more expensive and
the installation process becomes slower and more complex, which
significantly increases the cost per installation, and deployments
may involve thousands or even millions of devices.

 From a security perspective, using trusted nodes is not
advisable. Many systems are deployed by independent installers,
and giving them access to secret keys significantly increases the
risk of compromise or leakage and may create legal issues. While
ephemeral key exchanges should ideally occur frequently, this
is unlikely to be feasible with ML-KEM. Even a single ML-KEM key
exchange for one device is challenging due to the limited uplink
and extremely constrained downlink capacity. If millions of devices
were to perform frequent ML-KEM exchanges, they would likely exceed
the network capacity. There is typically no “free” space to
piggyback ML-KEM fragments on existing messages. And while 1500
bytes is the additional overhead compared to ECC, implementing
secure and reliable fragmentation over many weeks with new messages
introduces a substantial amount of further overhead. More exact
estimates likely require similation.

This actually leads to a separate problem: how are devices expected to
authenticate the control node?  This is easy if there is a cloud-based
control plane, as the cloud server's authentication keys can be
hard-coded.  However, requiring a cloud service is undesirable from
security, privacy, and reliability perspectives.

Otherwise, the device somehow needs to obtain the authentication keys
of its owner via an out of band mechanism, which could also be used
for bootstrapping.  The out of band mechanism could be as simple as
the 1-Wire bus, which can be driven by a GPIO.

An out of band mechanism is also useful for firmware updates, for
which the radio network appears to be way too slow.

Are CSIDH derivatives compact enough for frequent ephemeral key
exchange?  Their keys are still significantly longer than EC keys.

As an aside, my understanding is that most OSS development mailing
lists prefer avoiding top-posting.  Are the norms different here?

On 2026-03-06, 04:52, "Demi Marie Obenour" <[email protected]> wrote:

On 3/5/26 14:28, John Mattsson wrote:
Demi Marie Obenour wrote:
Would it be possible to split the KEM over many messages, with forward
error correction used to ensure that the message eventually arrives?
The key exchange itself would take a very long time, but after setup
(which could be out of band) it would happen concurrently with traffic
already flowing through the network. Is sending 1500 bytes over a
matter of days a reasonable option?

I think it is very good that you explicitly mention that in more constrained 
networks this could take days. Many people do not realize this, and it puts the 
“seconds of computation” discussion in a completely different light.

An additional challenge in LPWAN networks is that downlink
capacity is typically much smaller than uplink capacity. An
installation process that takes several days would significantly
increase operational costs, since failures would only be detected
much later. While a single device might still be able to complete
bootstrapping over the course of several days, deploying thousands
of devices at scale could become problematic due to limited network
capacity. In such cases, the overall installation process could
stretch into weeks.


Would it be possible to perform bootstrapping out of band over an
unconstrained (or less-constrained) network? This should almost always
be possible because the devices need to be physically placed in their
intended locations. This means the devices need to be physically close
to a trusted party, and the key exchange could happen at this time.
Since the device only needs to communicate over a short distance,
it can use a high-speed network such as Bluetooth or Wi-Fi.


There are at least two ways this can be implemented:


1. Each person deploying a device carries a relay node that has a
high-bandwidth uplink, such as cellular or LEO satellite service.
This is used to proxy traffic from the constrained device back to
its controller.


2. Each person deploying a device carries a trusted node that records
the derived symmetric keys. After they return to base, this node
uploads the (encrypted) symmetric keys to the controller.


Subsequent key exchange is only necessary for forward secrecy, for
which https://signal.org/docs/specifications/mlkembraid/ 
<45acac64-721b-4904-9c71-686fcd0cef4e> can be used.
Thanks to Deirdre Connolly for mentioning this.


I wonder if they expect these networks to adapt to the changing
cryptographic requirements, rather than the other way around.

I think government agencies sometimes have limited insight into how
cryptography is used in different industries. One practical example I
encountered was a government representative who had worked primarily
with military systems and was very surprised that industry places
significant emphasis on performance and cost.

Another example is the suggestion to limit European industry to
the ECCG ACM list. Such a restriction would be extremely costly for
European industry and, in many cases, reduce security rather than
improve it. More broadly, the focus on cryptographic algorithms is
somewhat misplaced. Implementation bugs, misuse, and poor protocol
design are often much greater sources of security problems than
the algorithms themselves.


I agree. In particular, the low downlink capacity means that
OTA firmware updates are quite difficult, despite being absolutely
critical for security. Unless one is going to formally verify all
firmware that deals with untrusted inputs, there is likely to be at
least one remotely-exploitable vulnerability found.


 From what very little I have read, it seems that the main reasons
these networks have such poor throughput are limited radio spectrum
and limited battery size. Both are ultimately under human control:
the first can be changed by regulators, and the second can be changed
by spending more on the product.

Yes, but the total amount of spectrum is fixed and not under human
control. There is very little unused spectrum in the sub-GHz bands
suitable for LPWAN, and expanding spectrum for these networks would
require reducing spectrum available to other services, something
that is rarely practical.

If bootstrapping occurs only once over the device’s 10-year
lifetime, the impact on battery life is likely limited.


I think that key exchange should happen many times so that forward
secrecy is obtained, but the subsequent key exchanges are not
performance critical. OTA firmware updates are much harder.
On 2026-03-05, 10:53, "Demi Marie Obenour" <[email protected] 
<4baf4eaa-f9cc-47e6-8f0c-efc0a170e02c>> wrote:

On 3/5/26 02:42, John Mattsson wrote:
Hi,

The large sizes of ML-KEM and the absence of NIKE have been identified as 
significant hurdles for constrained radio systems. In secdispatch, Demi Marie 
Obenour asked about the current status of CSIDH and group-action–based 
cryptography. While I try to keep up with developments, many members of CFRG 
undoubtedly have a far more comprehensive understanding of the field.

What is the current state of the art for quantum-resistant group-action–based 
NIKEs, and when might this area be ready for standardisation?

Cheers,
John Preuß Mattsson

From: John Mattsson <[email protected] 
<c93fc91c-4b2e-459c-ae15-4ca2c8d822fb><mailto:[email protected] 
<f6d1f6ee-4e4b-4fe7-9c22-131c935a96bf>>>
Date: Thursday, 5 March 2026 at 08:27
To: Demi Marie Obenour <[email protected] <507852db-f462-45df-9523-3d67b80471e4><mailto:[email protected] 
<7166d630-1a9a-43dd-86d5-cc14284455ea>>>, Phillip Hallam-Baker <[email protected] 
<d2de2b1c-53f4-4034-a1ab-07f4daa8a952><mailto:[email protected] <9f129067-dd58-4a2f-92d8-ee6819e40fcd>>>, Carlos Aguilar 
Melchor <[email protected] <06e9e16f-15fc-473a-8d88-a5363bb5fb6b><mailto:[email protected] 
<549ad24b-618a-4796-9b09-8df8c8f8f7e4>>>
Cc: Russ Housley <[email protected] <78a594b5-efd5-4fc3-a69a-1270786e71db><mailto:[email protected] 
<77cb8763-6075-4db8-9acc-45296c1cd16c>>>, IETF SecDispatch <[email protected] 
<d4317401-e51e-4f46-9c54-601dab18d5ff><mailto:[email protected] <cd37fd42-6ccf-4a01-be4f-59cc0cf039ed>>>
Subject: [Secdispatch] Re: Topic request: Security protocols that optimized for 
non-web and PQC

Demi Marie Obenour wrote:
What are some known improvements on CSIDH? Are further improvements believed 
possible?

There has been extensive follow-up work on CSIDH and group-action
based cryptography since 2018. Research has focused on improving
software and hardware performance, strengthening implementation
security, refining parameter selection, and developing improved
cryptanalytic attacks. There are literally hundreds of papers.
As far as I know, the general view is that further improvements are
very likely and that new attacks may emerge. I do not believe that
even the trade-offs of Kuperberg’s algorithm is yet sufficiently
well understood.

Are any of these improvements likely to decrease the message sizes?
Right now, it seems that quantum attacks keep increasing them.

Stephen Farrell wrote:
It'd be useful if there were a draft with tables that showed the sizes with pq 
algs as well.

The 600-byte absolute difference would still remain and still be
significant if ML-KEM were deployed. However, for many systems,
adding 1,500 bytes of overhead is simply not feasible. Many
constrained radio systems have no option but to continue using ECC,
or revert to symmetric-key-only solutions, with all the associated
limitations. A NIKE with much smaller public keys than ML-KEM would
therefore be a major advantage, even if it requires more computation.
Would it be possible to split the KEM over many messages, with forward
error correction used to ensure that the message eventually arrives?
The key exchange itself would take a very long time, but after setup
(which could be out of band) it would happen concurrently with traffic
already flowing through the network. Is sending 1500 bytes over a
matter of days a reasonable option?

I have asked both NIST and European agencies what they expect
constrained radio systems to do when they forbid ECC in 2030–2035
without getting any answers. I have also heard Scott asking NIST what
they plan as a replacement for the currently specified static-static
modes without gettting any answers.

I wonder if they expect these networks to adapt to the changing
cryptographic requirements, rather than the other way around. Nature
does not owe us secure cryptography with small keys and messages.
It could be that the only option that maintains security is to send
more data.

 From what very little I have read, it seems that the main reasons
these networks have such poor throughput are limited radio spectrum
and limited battery size. Both are ultimately under human control:
the first can be changed by regulators, and the second can be changed
by spending more on the product. Neither helps cases like wildlife
trackers, though, as those need to be small and light enough that
they do not disturb the animal they are attached to.

At some point, I would like to see a ramp-on for NIKEs.

I know it isn't an option for constrained devices, but SWOOSH
is a (hopefully) fast option when bandwidth is not a concern.

Cheers,
John Preuß Mattsson

On 2026-03-04, 21:57, "Demi Marie Obenour" <[email protected] 
<6b8c2b80-d82a-4a21-992a-8b4e5c7a970b><mailto:[email protected] 
<ccebc57f-a951-43a2-a23d-cdfa2830c883>>> wrote:

On 3/4/26 05:04, John Mattsson wrote:
Hi Demi,

The LAKE WG is working on integrating PQC algorithms into EDHOC.

https://datatracker.ietf.org/doc/draft-spm-lake-pqsuites/ 
<eeccd51d-3824-4c2d-b3bd-eeaf4d2beb2c>
This draft registers ML-KEM cipher suites for EDHOC, which can be used with 
both signature and PSK authentication. While EDHOC with ML-KEM-512 is much 
larger than EDHOC with ECC, it is still significantly smaller than, for 
example, TLS 1.3 with X25519MLKEM768 or ML-KEM-512:
https://datatracker.ietf.org/doc/draft-ietf-iotops-security-protocol-comparison/09/ 
<d82148bd-2a84-4a2b-81af-5bffa0aeaa8c>

For signatures, NIST is making good progress. FN-DSA, MQ, and SQISign are all 
considerably smaller than ML-DSA:
https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/Nj1c9fWE0S8/m/p8_MPZ6lBAAJ 
<1579b886-25dd-4f54-865e-c058927885ce>

CSIDH and its subsequent improvements do appear to be the only viable option for 
quantum-resistant key exchange with much smaller "key shares" than ML-KEM. 
Other lattice-based key exchange algorithms do not offer significant improvements and 
often comes with some disadvantages compared to ML-KEM. I wish NIST, CFRG, or an 
independent crypto competition would place more focus on isogeny-based NIKEs as a 
potential candidate for future standardization. They aren’t ready yet, but more focused 
efforts could help to make them ready. CSIDH would be a drop-in replacement for ECDH and 
EDHOC and could be used for both key exchange and authentication.

What are some known improvements on CSIDH? Are further improvements
believed possible?

Another significant concern with lattice-based and code-based KEMs is
that they are difficult to defend from physical side-channel attacks.
This is because one cannot validate ciphertexts without using the
secret key, so very powerful side-channel-assisted chosen-ciphertext
attacks are possible.

I expect that there are cases where side channel resistance is much
more important than speed or message size. In these cases, I expect
Raccoon to be the obvious choice for signatures. For KEMs, would it
make sense to require that the sender provide a zero-knowledge proof
that the ciphertext was honestly generated? Or are there lattice-based
or code-based KEMs that are easy to protect from physical side-channel
attacks?
--
Sincerely,
Demi Marie Obenour (she/her/hers)



--
Sincerely,
Demi Marie Obenour (she/her/hers)





--
Sincerely,
Demi Marie Obenour (she/her/hers)


--
Sincerely,
Demi Marie Obenour (she/her/hers)







--
Dr. J.W. Atwood, Eng. (retired)
Distinguished Professor Emeritus
Department of Computer Science
   and Software Engineering
Concordia University ER 1234      email:[email protected]
1455 de Maisonneuve Blvd. West    http://users.encs.concordia.ca/~bill
Montreal, Quebec Canada H3G 1M8

_______________________________________________
Anima mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to