On Mon, Oct 27, 2025 at 04:06:35PM -0400, Sean Turner wrote:

> Hi! It appears we have failed to reach consensus to make a change as a
> result of this comment. If you disagree with this, please indicate why
> (and provide some text) by 31 October 2025.

That's seems to me to be unfortunate, because the original advice to the
implementor to "retry" in case of failure is unreasonable.

    - It is unclear how the this sort of failure might be distinguished
      from genuinely bad incoming ciphertext, or data corruption in
      transit.

    - The probability of algorithm failure appears to be far lower than
      that of failure of the computer hardware on which the algorithm is
      executed.
      

> >> I think there is consensus that there is no advise to give to implementers
> >> to handle these failure cases. While we could use that to justify saying
> >> nothing, my own preference is to at least have a sentence explicitely
> >> saying that implementers should do nothing, in case implementers become
> >> aware of these theortical failures and wrongly assume the specification
> >> was not aware and thus "vulnerable" to these issues.
> >> 
> >> Perhaps:
> >> 
> >> Current:
> >>     Some post-quantum key exchange algorithms, including ML-KEM
> >>     [NIST-FIPS-203], have non-zero probability of failure, meaning two
> >>     honest parties may derive different shared secrets. This would cause a
> >>     handshake failure. ML-KEM has a cryptographically small failure rate; 
> >> if
> >>     other algorithms are used, implementers should be aware of the 
> >> potential
> >>     of handshake failure.  Clients MAY retry if a failure is encountered.
> >> 
> >> New:
> >>     Some post-quantum key exchange algorithms, including ML-KEM
> >>     [NIST-FIPS-203], have non-zero probability of failure, meaning
> >>     two honest parties may derive different shared secrets. This
> >>     would cause a handshake failure. As with other similar failures
> >>     (such as bit corruptions), Clients MAY retry if a failure is
> >>     encountered. Due to the negliable rate of occurances of these
> >>     failure events, the lack of a known feasable method and the
> >>     additional risk of introducing new attack vectors when attempting
> >>     to handle these events, it is RECOMMENDED for implementers to
> >>     not specifically handle post-quantum key exchange shared secrets
> >>     failures, and rely on the pre-existing code paths that handle
> >>     derivation failures.

It was my impression that there was rough consensus to drop the original
text and say nothing instead, though the "New" text above is instead an
acceptable overly-elaborate way of saying "nothing to see here, move
along".

-- 
    Viktor.  🇺🇦 Слава Україні!

_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to