Liaison statement
Response to the Liason Statement on Quantum Safe Cryptographic Protocol Inventory
Additional information about IETF liaison relationships is available on the
IETF webpage
and the
Internet Architecture Board liaison webpage.
State | Posted |
---|---|
Submitted Date | 2024-07-25 |
From Group | SEC |
From Contact | Deb Cooley |
To Group | ESTI-TC-CYBER |
To Contacts | campagna@amazon.com CyberSupport@etsi.org |
Cc | The IETF Chair <chair@ietf.org> Paul Wouters <paul.wouters@aiven.io> Deb Cooley <debcooley1@gmail.com> Russ Housley <housley@vigilsec.com> Tim Hollebeek <tim.hollebeek@digicert.com> Yoav Nir <ynir.ietf@gmail.com> Tero Kivinen <kivinen@iki.fi> Sofia Celi <sceli@brave.com> Paul Hoffman <paul.hoffman@icann.org> Joseph Salowey <joe@salowey.net> Sean Turner <sean+ietf@sn3rd.com> Deirdre Connolly <durumcrustulum@gmail.com> |
Response Contact | Paul Wouters <paul.wouters@aiven.io> Deb Cooley <debcooley1@gmail.com> |
Purpose | In response |
Attachments | (None) |
Liaisons referred by this one |
Quantum Safe Cryptographic Protocol Inventory
|
Body |
The IETF thanks the ETSI TC CYBER for your liaison titled, "Quantum Safe Cryptographic Protocol Inventory" (https://datatracker.ietf.org/liaison/1893/). We appreciate the ETSI TC CYBER work on this important topic and your effort to keep the IETF apprised of your progress, including sharing developed document, and details of the ongoing work. IETF considers PQC migration a very important topic and are working on introducing PQC algorithms for key exchange, public-key encryption, and digital signatures as soon as possible after the ML-KEM, ML-DSA, and SLH-DSA standards are finalized by NIST. All pre-standardized algorithms have been marked as not recommended. IETF is currently discussing which hybrids and pure-PQ options to recommend. At this point there has been no suggestions to make PQC mandatory-to-implement. The ETSI TC CYBER liaison, developed document, and ongoing work were discussed within the IETF. Most active IETF working groups specifying protocols using asymmetric cryptography are discussing and working on the introduction of quantum-resistant algorithms. - IRTF CFRG has specified LMS and XMSS and is discussing how to best combine ECC and PQC in hybrid KEMs and how to introduce ML-KEM in Hybrid Public Key Encryption. https://datatracker.ietf.org/rg/cfrg/documents/ - IETF LAMPS are working on introducing LMS, XMSS, ML-DSA, SLH-DSA, and ML-KEM in X.509 Public Key Infrastructure and Cryptographic Message Syntax (CMS). https://datatracker.ietf.org/wg/lamps/documents/ - IETF IPSECME has specified a quantum-resistant PSK extension as well as intermediate and multiple key exchanges to prepare for PQC. IPSECME is discussing introduction of ML-KEM, ML-DSA, and FrodoKEM. https://datatracker.ietf.org/group/ipsecme/documents/ - IETF TLS is discussing introduction of ML-KEM+ECC hybrids and ML-KEM standalone for (D)TLS 1.3 . There are already deployments of pre-standard Kyber768. Note that the obsolete TLS 1.2 will not receive any updates. https://datatracker.ietf.org/group/tls/documents/ https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml - IETF JOSE and COSE are working on introduction of ML-DSA and SLH-DSA for use in e.g. JWS/JWT/OAuth 2.0. Discussions on how to introduce ML-KEM. https://datatracker.ietf.org/wg/jose/documents/ https://datatracker.ietf.org/wg/cose/documents/ - IETF PQUIP is a standing venue to discuss PQC migration. PQUIP is working on classification, terminology, and guidance documents. https://datatracker.ietf.org/wg/pquip/documents/ - IETF has reopened the SSH mailing list to allow discussion of migration to PQC. https://mailarchive.ietf.org/arch/browse/ssh/ One recommended contact point for clarification on specific topics is to send a mail to the relevant mailing list or to the working group chairs. The document ETSI TR 103 619 V1.1.1 (2020-07) highlighted in the LS was discussed on several IETF mailing lists. We kindly suggest that ETSI CYBER consider the following suggestions in the next revision of TR 103 619: - Consider using the established term Cryptographically Relevant Quantum Computers (CRQCs). It is important that readers understand that there is a huge difference between current quantum computers and CRQCs. - Consider using another term than “classical cryptography”. It might confuse the reader as quantum-resistant cryptography like ML-KEM and ML-DSA runs on classical computers. A term used in IETF is “traditional” [1]. - Consider updating and correcting the information regarding symmetric cryptography. The idea that symmetric cryptography will be practically affected by CRQCs is now seen as a misconception. The “bits of security” concept does not work with algorithms that are not parallelizable and NIST is therefore transitioning to quantum-resistant security levels based on symmetric algorithms where level 1 is equivalent with AES-128, level 2 is SHA-256, etc. [2]. UK government assesses that “symmetric algorithms with at least 128-bit keys (such as AES) can continue to be used” [3]. While classical supercomputers might be able to brute force AES-128 around the year 2090 [4-5], a huge cluster of one billion CRQCs (according to one estimate costing one billion USD each) would take a million years of uninterrupted calculation to find a single AES-128 key. Algorithms with quadratic (n^2) speedup like Grover’s algorithm (which is proven to be optimal) will not provide any practical quantum advantage for breaking symmetric cryptography and likely not for any other problems [6-7]. - The name of the X.509 field is “Subject Public Key Info”, not “Subject Key Info”. Sincerely, Deb Cooley IETF Security Area Director [1] Driscoll, Parsons, “Terminology for Post-Quantum Traditional Hybrid Schemes” https://datatracker.ietf.org/doc/draft-ietf-pquip-pqt-hybrid-terminology/ [2] NIST, “Comments Requested on Three Draft FIPS for Post-Quantum Cryptography” https://csrc.nist.gov/news/2023/three-draft-fips-for-post-quantum-cryptography [3] UK NCSC, “Next steps in preparing for post-quantum cryptography” https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography [4] CRYPTEC, “Cryptographic Technology Evaluation Committee Activity Report” https://www.cryptrec.go.jp/symposium/2023_cryptrec-eval.pdf [5] CRYPTEC, “Japan CRYPTREC Activities on PQC” https://events.btq.li/Japan_CRYPTREC_Activities_on_PQC_Shiho_Moriai.pdf [6] Hoefler, Häner, Troyer, “Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage” https://cacm.acm.org/magazines/2023/5/272276-disentangling-hype-from-practicality-on-realistically-achieving-quantum-advantage/fulltext [7] Babbush, McClean, Newman, Gidney, Boixo, Neven, “Focus beyond Quadratic Speedups for Error-Corrected Quantum Advantage” https://arxiv.org/pdf/2011.04149.pdf |