So, based on FIPS 140-3 I.G., section C.K., resolution 5, [1]. "SP800-186 does 
not impact the curves permitted under SP 800-56Arev3. Curves that are included 
in SP 800-186 but not included in SP 800-56Arev3 are not approved for key 
agreement. E.g., the ECDH X25519 and X448 key agreement schemes (defined in RFC 
7748) that use Curve25519 and Curve448, respectively, are not compliant to SP 
800-56Arev3…”. This may potentially be a problem, right?

I think to support FIPS requirements properly, we need both shares to be 
generated by FIPS approved methods.

Ideally, I would much prefer to have only one combination and then 
X25519-MLKEM768 should be the one.
Maybe it’s worth to consider another way to go, So, assuming no one wants to 
use P-{256,384}+Kyber for other reason that FIPS, maybe it’s wroth trying to 
“encourage" NIST to allow X-{25519,448} in FIPS (at least if used for hybrid 
key exchange). If anybody is interested in doing that then I’m happy to help. 

As of today, I’m +1 with Panos.

PS: Note that X25519 is allowed in FIPS 140-2 (i.e. see OpenSSL’s certification 
[2]). 

[1] 
https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf
[2] 
https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282

Kind regards,
Kris



> On 6 Nov 2023, at 18:06, Bas Westerbaan <[email protected]> 
> wrote:
> 
> 
> On Mon, Nov 6, 2023 at 5:40 PM Kampanakis, Panos 
> <[email protected]> wrote:
> > Concretely, after ML-KEM is finished, I was planning to update 
> > draft-schwabe-cfrg-kyber to match it, and proposing to register a codepoint 
> > for a single ML-KEM-768 hybrid in draft-ietf-tls-hybrid-design.
>  Agreed, but I would suggest three (x25519-mlkem768, p256-mlkem768, 
> p384-mlkem1024) to cover FIPS and CNSA 2.0 compliance. More than three 
> combinations is unnecessary imo.
> 
> x25519-mlkem768 will be FIPS thanks to mlkem768. Have you seen x25519 is in 
> SP 800-186 now? So I say we can leave out p256-mlkem768.
> 
> Best,
> 
>  Bas
> _______________________________________________
> TLS mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tls

Reply via email to