Hello,


1. **Alignment of NamedGroup X25519MLKEM768** with the order of shared secrets, as per Section 3.2 of draft-ietf-tls-hybrid-design.    - I suggest updating the name to mlkem768_x25519, while keeping the codepoint unchanged (if that is acceptable). If      this change is made, I also recommend changing the name of Secp256r1MLKEM768 to align with x25519.

Following the feedback from the last TLS meeting at IETF@121, I have opened this PR to change the name from X25519MLKEM768 to MLKEM768X25519. This change aligns with draft-ietf-tls-hybrid-design-11 (section 3.2).
https://github.com/post-quantum-cryptography/draft-kwiatkowski-tls-ecdhe-mlkem/pull/26


2. **Changing the order of shares in Secp256r1MLKEM768**.
   - The current order is based on requirements from SP800-56C-r2, and it was chosen to facilitate the migration of the TLSv1.3      handshake in a flow requiring FIPS certification. Although the switched order of shares aligns with FIPS, it necessitates      the re-certification of the cryptographic module. The current order supports modules that are already deployed in the field.      My (slight) personal preference would be to proceed with adoption but switch the order only if NIST relaxes the requirement      regarding the order of shares in SP800-56C-r2, which we know is under discussion. Otherwise, I believe the current choice      better supports migration to non-hybrid MLKEM, but I would appreciate feedback on this decision (ideally from others who
     have a requirement for FIPS).

According to the message from https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/ST_yMzYyMl0, NIST plans to permit the ordering of shares in either direction. This approach addresses the previously mentioned issue, so no further changes are needed in this regard. I believe it is now appropriate to register an additional code point for Secp384r1MLKEM1024, as currently outlined in the draft.


3. **Setting RECOMMENDED=Y for Secp256r1MLKEM768**.

I think this can only be done once draft if adopted. Hence, no change here (for now).

> On 11/11/2024 23:14, Andrei Popov wrote:
> I support adoption. The question of explicitly prohibiting key share reuse is orthogonal; this can be done in a separate document. I agree that the PR was submitted to change the text in the draft, but I think it would be better to include this text in draft-ietf-tls-hybrid-design. I have opened this PR
https://github.com/dstebila/draft-ietf-tls-hybrid-design/pull/39.

With that I hope the draft is ready for adoption.
Any feedback is more then welcome.

Kind regards,
Kris

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to