To what extent should our COSE post-quantum work be aligning with what's 
happening in LAMPS?  And what would that entail?

                                                                With curiosity,
                                                                -- Mike

From: 'Kampanakis, Panos' via pqc-forum <[email protected]>
Sent: Monday, July 29, 2024 7:25 PM
To: David A. Cooper <[email protected]>
Cc: pqc-forum <[email protected]>
Subject: RE: [pqc-forum] Pure and pre-hash object identifiers for ML-DSA and 
SLH-DSA

Hi David,

The ML-DSA and SLH-DSA X.509 drafts (and the SLH-DSA CMS draft) all had pure PQ 
signatures in the back of their minds like RFC8410 did for EdDSA. But the CRL 
use-case is an interesting one. Maybe prehash signing makes sense there if the 
signing frequency and message size justify it.

I would advocate for distinct identifiers for the pure and prehash variants of 
both the Sig and PK for the same reasons David B. lays out in his 
https://mailarchive.ietf.org/arch/msg/spasm/Ssk0hTwLm2ao0Fkvxa7jyfdMREg/ Maybe 
CRL signing does not have the same risk regarding collision resistance as you 
are suggesting and one PK identifier would make sense there, but these OIDs 
could be used in many places. We can't predict they will go only in CRL signing.

Rgs



From: 'David A. Cooper' via pqc-forum 
<[email protected]<mailto:[email protected]>>
Sent: Monday, July 29, 2024 11:57 AM
To: pqc-forum <[email protected]<mailto:[email protected]>>
Subject: [EXTERNAL] [pqc-forum] Pure and pre-hash object identifiers for ML-DSA 
and SLH-DSA


CAUTION: This email originated from outside of the organization. Do not click 
links or open attachments unless you can confirm the sender and know the 
content is safe.

Hi all,

As was previously announced on the 
pqc-forum<https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/JKMh0D0pa30/m/vbflXolxAQAJ>,
 ML-DSA and SLH-DSA will specify separate "pure" and "pre-hash" versions, with 
domain separation to prevent pre-hash signatures verifying as pure signatures 
and vice versa.

The IETF LAMPS working group is developing drafts that will specify semantics 
for OIDs associated with ML-DSA and SLH-DSA: 
https://www.ietf.org/archive/id/draft-ietf-lamps-dilithium-certificates-04.html 
and https://www.ietf.org/archive/id/draft-ietf-lamps-x509-slhdsa-01.html. In 
these drafts, for each parameter set, the same OID is used to identify both a 
public key and a signature. However, the IETF drafts do not account for the 
separate pure and pre-hash options.

For the digital signature algorithms in FIPS 186-5 the public key and the 
signature algorithm identifiers are separate. For example, with ECDSA the 
public key is just identified as an elliptic curve key (ecPublicKey) and only 
the signature algorithm identifier indicates what hash function to use to 
verify the signature (e.g. ecdsaWithSHA256, ecdsaWithSHA512). Using 
SLH-DSA-SHA2-128s as an example, if NIST were to follow this approach with 
ML-DSA and SLH-DSA, then any public key using the SLH-DSA-SHA2-128s parameter 
set could be identified using the OID id-alg-slh-dsa-sha2-128s. A pure 
signature would also be identified using id-alg-slh-dsa-sha2-128s. A pre-hash 
signature would be identified with an OID that also indicated how pre-hashing 
was performed (e.g., id-alg-slh-dsa-sha2-128s-with-sha256-prehash).

A second option (as suggested in 
https://mailarchive.ietf.org/arch/msg/spasm/Ssk0hTwLm2ao0Fkvxa7jyfdMREg/) would 
be for the public key identifier to indicate how signatures are generated. In 
this case, if a public key were identified as id-alg-slh-dsa-sha2-128s, then it 
could only be used to verify pure signatures. A public key identified as 
id-alg-slh-dsa-sha2-128s-with-sha256-prehash could only be used to verify 
signatures created by pre-hashing with SHA-256.

While we believe that it is generally best not to use the same key for both 
pure and pre-hash signatures, we are currently inclined to use a single 
identifier for the public key (e.g., id-alg-slh-dsa-sha2-128s) regardless of 
whether the key will be used to generate pure or pre-hash signatures. An 
example of where this flexibility could be helpful would be in a PKI. A CA 
might use pure signatures to sign certificates, but use pre-hash signatures to 
sign CRLs. While certificates may be small enough to sign in a pure mode, CRLs 
can become very large. Also, if there is a concern about needing to depend on 
the collision resistance of the hash function when using the pre-hash option, 
this is less of a concern with CRLs. An attacker may provide a certificate 
request message that will be used in the generation of the certificate, but it 
would be much more difficult for an attacker to have any impact on the contents 
of a CRL (in a way that could create a collision).

We would appreciate any feedback you may have on this issue.

Thank you,

David
--
You received this message because you are subscribed to the Google Groups 
"pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to 
[email protected]<mailto:[email protected]>.
To view this discussion on the web visit 
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/0ec37c8d-a78e-4630-af5e-0ac1ad1177d4%40nist.gov<https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/0ec37c8d-a78e-4630-af5e-0ac1ad1177d4%40nist.gov?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to the Google Groups 
"pqc-forum" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to 
[email protected]<mailto:[email protected]>.
To view this discussion on the web visit 
https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/bc01337638364bf9a01ba1cabdd8a8aa%40amazon.com<https://groups.google.com/a/list.nist.gov/d/msgid/pqc-forum/bc01337638364bf9a01ba1cabdd8a8aa%40amazon.com?utm_medium=email&utm_source=footer>.
_______________________________________________
COSE mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to