[{"author": "Michele Orr\u00f9", "text": "<p>okok let's just use those.</p>", "time": "2025-03-17T06:00:15Z"}, {"author": "Alexey Melnikov", "text": "<p>And thus they are in the Meetecho</p>", "time": "2025-03-17T06:00:17Z"}, {"author": "Michele Orr\u00f9", "text": "<p>thanks Alexey.</p>", "time": "2025-03-17T06:00:18Z"}, {"author": "Valery Smyslov", "text": "<p>Hi, I'll be a jabber scribe for the session. If you want to relay your comment to the mic, please prepend it with MIC:</p>", "time": "2025-03-17T06:01:59Z"}, {"author": "Stephen Farrell", "text": "<p>\"pain point\": CFRG doing stuff that should've moved over to IETF (e.g. HPKE maintenance); doesn't seem to be on that list</p>", "time": "2025-03-17T06:07:05Z"}, {"author": "Stephen Farrell", "text": "<p>is now the place to comment on that?</p>", "time": "2025-03-17T06:07:52Z"}, {"author": "Alexey Melnikov", "text": "<p>Stephen: we don't really have a good process for this and this doesn't happen very often. But yes, worth thinking about</p>", "time": "2025-03-17T06:07:57Z"}, {"author": "Mike Ounsworth", "text": "<p>(hello from the RATS room)</p>", "time": "2025-03-17T06:08:00Z"}, {"author": "Stephen Farrell", "text": "<p>@alexey: s/thinking about/doing something about/ I'd say</p>", "time": "2025-03-17T06:08:19Z"}, {"author": "Alexey Melnikov", "text": "<p>Stephen: no time at the moment, bring to the mailing list?</p>", "time": "2025-03-17T06:08:29Z"}, {"author": "John Preu\u00df Mattsson", "text": "<p>Updated charter or a FAQ seems like a good idea.</p>", "time": "2025-03-17T06:08:46Z"}, {"author": "Alexey Melnikov", "text": "<p>Stephen: Fair enough</p>", "time": "2025-03-17T06:08:59Z"}, {"author": "Bas Westerbaan", "text": "<p>Recharter or a new CFWG sounds great.</p>", "time": "2025-03-17T06:09:07Z"}, {"author": "Stephen Farrell", "text": "<p>updated charter that moves some relevant maintenance work to IETF: yes; updated charter that doesn't do that: meh</p>", "time": "2025-03-17T06:09:34Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150824\">said</a>:</p>\n<blockquote>\n<p>\"pain point\": CFRG doing stuff that should've moved over to IETF (e.g. HPKE maintenance); doesn't seem to be on that list</p>\n</blockquote>\n<p><span class=\"user-mention\" data-user-id=\"603\">@Deirdre Connolly</span> will be bringing this up later today at PQUIP, right?<br>\n<a href=\"https://datatracker.ietf.org/doc/slides-122-pquip-ietf-is-quantum-fragile/\">https://datatracker.ietf.org/doc/slides-122-pquip-ietf-is-quantum-fragile/</a></p>", "time": "2025-03-17T06:10:07Z"}, {"author": "Stephen Farrell", "text": "<p>I don't think the issue is PQ specific at all</p>", "time": "2025-03-17T06:11:10Z"}, {"author": "Mike Ounsworth", "text": "<p>CFME WG -- Crypto Forum Maintenance WG?</p>", "time": "2025-03-17T06:11:22Z"}, {"author": "Deirdre Connolly", "text": "<p>It isn't, but it's especially painful for the PQ transition</p>", "time": "2025-03-17T06:11:26Z"}, {"author": "Martin Thomson", "text": "<p>I don't like the CFWG idea very much.  The IETF has clear processes for handling new work, which is not centered on technology, but use cases and solutions.</p>", "time": "2025-03-17T06:11:42Z"}, {"author": "Stephen Farrell", "text": "<p>CFME: doesn't sound goo</p>", "time": "2025-03-17T06:11:52Z"}, {"author": "Martin Thomson", "text": "<p>If the IETF wants to do some crypto work, then it can charter working groups to do specific things.</p>", "time": "2025-03-17T06:11:58Z"}, {"author": "Stephen Farrell", "text": "<p>s/goo/good/</p>", "time": "2025-03-17T06:12:00Z"}, {"author": "Martin Thomson", "text": "<p>For instance, HPKE should have been done in the IETF.  It's engineering.</p>", "time": "2025-03-17T06:12:10Z"}, {"author": "Martin Thomson", "text": "<p>Similarly KEM combiners work is engineering, not research.</p>", "time": "2025-03-17T06:12:23Z"}, {"author": "Deirdre Connolly", "text": "<p>Shall we have a working group for all the crypto engineering specification work CFRG says it doesn't do?</p>", "time": "2025-03-17T06:12:30Z"}, {"author": "Stephen Farrell", "text": "<p>@mt: don't quite agree, initial work in CFRG makes sense but needs to be handed off</p>", "time": "2025-03-17T06:12:49Z"}, {"author": "Martin Thomson", "text": "<p>I don't think we need a single place.</p>", "time": "2025-03-17T06:12:53Z"}, {"author": "Stephen Farrell", "text": "<p>HPKE is used by TLS &amp; MLS, one of 'em should do maintenance</p>", "time": "2025-03-17T06:13:18Z"}, {"author": "Bas Westerbaan", "text": "<blockquote>\n<p>For instance, HPKE should have been done in the IETF.  It's engineering.<br>\nSimilarly KEM combiners work is engineering, not research.</p>\n</blockquote>\n<p>Where would you pyt these two today at the IETF?</p>", "time": "2025-03-17T06:13:19Z"}, {"author": "Martin Thomson", "text": "<p>The CFRG can help bootstrap stuff, but when it is clearly engineering, there needs to be a clean path to handover.</p>", "time": "2025-03-17T06:13:20Z"}, {"author": "Richard Barnes", "text": "<p>diagram not to scale</p>", "time": "2025-03-17T06:13:32Z"}, {"author": "Mike Ounsworth", "text": "<p>Yeah, we're literally talking about a \"CF Maintenance\" WG that CFRG can hand off \"completed\" work to.</p>", "time": "2025-03-17T06:13:57Z"}, {"author": "Martin Thomson", "text": "<p>@Bas well, HPKE might be a small WG; KEM combiners is not a single thing...TLS is already solving this, as is MLS</p>", "time": "2025-03-17T06:14:03Z"}, {"author": "Deirdre Connolly", "text": "<p>Unfortunately there is crypto engineering stuff that CFRG doesn't do, and doesn't require a full working group to live either temporarily or indefinitely</p>", "time": "2025-03-17T06:14:14Z"}, {"author": "Stephen Farrell", "text": "<p>@mike o: no I would not want that</p>", "time": "2025-03-17T06:14:20Z"}, {"author": "Daniel Gillmor", "text": "<p>OpenPGP is doing KEM combiners too</p>", "time": "2025-03-17T06:14:27Z"}, {"author": "Stephen Farrell", "text": "<p>we have survived without a PAKE WG for decades, and happily</p>", "time": "2025-03-17T06:14:53Z"}, {"author": "Deirdre Connolly", "text": "<p>So, there are many working groups doing cryptography</p>", "time": "2025-03-17T06:14:53Z"}, {"author": "Martin Thomson", "text": "<p>dkg: yes, and so are many others, but we have clear signals that a single solution isn't going to work</p>", "time": "2025-03-17T06:14:55Z"}, {"author": "Martin Thomson", "text": "<p>each of these groups needs to coordinate (we don't want to duplicate effort) but they don't need a single mechanism</p>", "time": "2025-03-17T06:15:12Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150875\">said</a>:</p>\n<blockquote>\n<p>we have survived without a PAKE WG for decades, and happily</p>\n</blockquote>\n<p>This is not a positive endorsement</p>", "time": "2025-03-17T06:15:14Z"}, {"author": "Bas Westerbaan", "text": "<p>@MT TLS does what works for TLS. Same for many other groups, and the outcomes are not ideal.</p>", "time": "2025-03-17T06:15:18Z"}, {"author": "Martin Thomson", "text": "<p>@bas that's a result of divergent requirements or lack of coordination.  The former being a good reason to have separate solutions; the latter, less so.</p>", "time": "2025-03-17T06:16:05Z"}, {"author": "Stephen Farrell", "text": "<p>if we had a crypto maintenance WG in IETF it would be as good/bad as CFRG thanks to involving the same peopel</p>", "time": "2025-03-17T06:16:06Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150882\">said</a>:</p>\n<blockquote>\n<p>@bas that's a result of divergent requirements or lack of coordination.  The former being a good reason to have separate solutions; the latter, less so.</p>\n</blockquote>\n<p>It's very clear that TLS can do things that other protocols using cryptography cannot do</p>", "time": "2025-03-17T06:16:30Z"}, {"author": "Richard Barnes", "text": "<p>KEM combiners, so hot right now</p>", "time": "2025-03-17T06:16:31Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150885\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150882\">said</a>:</p>\n<blockquote>\n<p>@bas that's a result of divergent requirements or lack of coordination.  The former being a good reason to have separate solutions; the latter, less so.</p>\n</blockquote>\n<p>It's very clear that TLS can do things that other protocols using cryptography cannot do</p>\n</blockquote>\n<p>This is not a failure of coordination</p>", "time": "2025-03-17T06:16:41Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150883\">said</a>:</p>\n<blockquote>\n<p>if we had a crypto maintenance WG in IETF it would be as good/bad as CFRG thanks to involving the same peopel</p>\n</blockquote>\n<p>Disagree</p>", "time": "2025-03-17T06:16:50Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150888\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150885\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150882\">said</a>:</p>\n<blockquote>\n<p>@bas that's a result of divergent requirements or lack of coordination.  The former being a good reason to have separate solutions; the latter, less so.</p>\n</blockquote>\n<p>It's very clear that TLS can do things that other protocols using cryptography cannot do</p>\n</blockquote>\n<p>This is not a failure of coordination</p>\n</blockquote>\n<p>Different goals, different charter</p>", "time": "2025-03-17T06:16:58Z"}, {"author": "Stephen Farrell", "text": "<p>disagreement is fine, TLS is also just another WG:-)</p>", "time": "2025-03-17T06:17:09Z"}, {"author": "Martin Thomson", "text": "<p>$X being special is true of all values of $X</p>", "time": "2025-03-17T06:17:15Z"}, {"author": "Bas Westerbaan", "text": "<p>Argon 2 is funny, as it's just writing down a standard of something that was invented elsewhere.</p>", "time": "2025-03-17T06:17:40Z"}, {"author": "Deirdre Connolly", "text": "<p>I'm not saying TLS is special, i'm saying different cryptographic protocols having different solutions that meet their needs is not a failure mode</p>", "time": "2025-03-17T06:17:44Z"}, {"author": "Richard Barnes", "text": "<p>TLS could clearly use a combiner that was applicable more broadly.  The fact that it's not does seem like a failure.</p>", "time": "2025-03-17T06:17:45Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"526\">Richard Barnes</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150898\">said</a>:</p>\n<blockquote>\n<p>TLS could clearly use a combiner that was applicable more broadly.  The fact that it's not does seem like a failure.</p>\n</blockquote>\n<p>Could, but would be less efficient for no security benefit</p>", "time": "2025-03-17T06:18:05Z"}, {"author": "Richard Barnes", "text": "<p>Security is not the only type of benefit that matters</p>", "time": "2025-03-17T06:18:22Z"}, {"author": "Christopher Wood", "text": "<p>@Richard FWIW, there was opposition to TLS using, e.g., X-Wing for its combiner</p>", "time": "2025-03-17T06:18:22Z"}, {"author": "Stephen Farrell", "text": "<p>there is a real tension there: people wanna go faster, other people want more analysis</p>", "time": "2025-03-17T06:18:24Z"}, {"author": "Martin Thomson", "text": "<p>I don't see a particular problem with how this has turned out in TLS.</p>", "time": "2025-03-17T06:18:27Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150901\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"526\">Richard Barnes</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150898\">said</a>:</p>\n<blockquote>\n<p>TLS could clearly use a combiner that was applicable more broadly.  The fact that it's not does seem like a failure.</p>\n</blockquote>\n<p>Could, but would be less efficient for no security benefit</p>\n</blockquote>\n<p>it is able to be both simpler, more efficient, easier to analyze, because of the exiting design of TLS 1.3 key schedule. This is not a failure case.</p>", "time": "2025-03-17T06:18:32Z"}, {"author": "Daniel Gillmor", "text": "<p>Bas, Argon 2 was also useful because the standard has many options; the spec was useful for guidance among the options.</p>", "time": "2025-03-17T06:18:32Z"}, {"author": "Martin Thomson", "text": "<p>dkg: that's engineering!</p>", "time": "2025-03-17T06:18:44Z"}, {"author": "Bas Westerbaan", "text": "<p>@Daniel, I don't disagree Argon is usefulm but it's against what the chairs just said the CFRG should be doing</p>", "time": "2025-03-17T06:18:59Z"}, {"author": "Stephen Farrell", "text": "<p>\"has many options\": the canonical fail of crypgraphers</p>", "time": "2025-03-17T06:19:01Z"}, {"author": "Daniel Gillmor", "text": "<p>+1 Stephen</p>", "time": "2025-03-17T06:19:12Z"}, {"author": "Daniel Gillmor", "text": "<p>\"i can't decide what to do here, so i'll leave it up to the even more ignorant consumers of my work\"</p>", "time": "2025-03-17T06:19:34Z"}, {"author": "Martin Thomson", "text": "<p>cryptographers want the most general solution, which is not very useful in practice</p>", "time": "2025-03-17T06:19:40Z"}, {"author": "Christopher Wood", "text": "<p>There are many examples that contradict the process described here on the slides <span aria-label=\"shrug\" class=\"emoji emoji-1f937\" role=\"img\" title=\"shrug\">:shrug:</span></p>", "time": "2025-03-17T06:19:49Z"}, {"author": "Bas Westerbaan", "text": "<p>100%</p>", "time": "2025-03-17T06:20:00Z"}, {"author": "Richard Barnes", "text": "<p>yeah, pretty sure nothing about the HPKE process matches this description</p>", "time": "2025-03-17T06:20:07Z"}, {"author": "Stephen Farrell", "text": "<p>for example?</p>", "time": "2025-03-17T06:20:08Z"}, {"author": "Richard Barnes", "text": "<p>(for example)</p>", "time": "2025-03-17T06:20:10Z"}, {"author": "Christopher Wood", "text": "<p>HPKE, VOPRF, Blind RSA, VDAF, BBS, ...</p>", "time": "2025-03-17T06:20:21Z"}, {"author": "Bas Westerbaan", "text": "<p>KEM combiners</p>", "time": "2025-03-17T06:20:27Z"}, {"author": "Stephen Farrell", "text": "<p>for HPKE much of the \"what do we want\" phase was in TLS yeah</p>", "time": "2025-03-17T06:20:43Z"}, {"author": "Deirdre Connolly", "text": "<p>Maybe FROST (i wasn't paying much attention before the chairs approached the FROST authors)</p>", "time": "2025-03-17T06:20:44Z"}, {"author": "Christopher Wood", "text": "<p>FROST is another example</p>", "time": "2025-03-17T06:20:52Z"}, {"author": "Deirdre Connolly", "text": "<p><span aria-label=\"smiling face with tear\" class=\"emoji emoji-1f972\" role=\"img\" title=\"smiling face with tear\">:smiling_face_with_tear:</span> 'pls read document'</p>", "time": "2025-03-17T06:21:46Z"}, {"author": "Deirdre Connolly", "text": "<p><span aria-label=\"sob\" class=\"emoji emoji-1f62d\" role=\"img\" title=\"sob\">:sob:</span> <br>\n<a href=\"/user_uploads/2/16/vfJWdX3oqUiyIjr6kQpP6-TI/image.png\">image.png</a></p>\n<div class=\"message_inline_image\"><a href=\"/user_uploads/2/16/vfJWdX3oqUiyIjr6kQpP6-TI/image.png\" title=\"image.png\"><img src=\"/user_uploads/2/16/vfJWdX3oqUiyIjr6kQpP6-TI/image.png\"></a></div>", "time": "2025-03-17T06:23:56Z"}, {"author": "Stephen Farrell", "text": "<p>\"velocity of <em>the</em> draft\" seems wrong aren't there 2?</p>", "time": "2025-03-17T06:24:08Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150937\">said</a>:</p>\n<blockquote>\n<p>\"velocity of <em>the</em> draft\" seems wrong aren't there 2?</p>\n</blockquote>\n<p>Currently one, the group voiced wanting two, it will be split easily</p>", "time": "2025-03-17T06:24:41Z"}, {"author": "Stephen Farrell", "text": "<p>OTOH velocity == no is pretty obvious:-)</p>", "time": "2025-03-17T06:24:51Z"}, {"author": "Jonathan Hoyland", "text": "<p>Amusing that the people who think it's going too slowly answer faster</p>", "time": "2025-03-17T06:25:27Z"}, {"author": "Christopher Wood", "text": "<p>I have contributed text and will continue to do so</p>", "time": "2025-03-17T06:25:28Z"}, {"author": "Daniel Gillmor", "text": "<p>this was the most elaborate setup i've ever seen for encouraging people to volunteer</p>", "time": "2025-03-17T06:25:29Z"}, {"author": "Stephen Farrell", "text": "<p>there was no mention of x-wing so far right?</p>", "time": "2025-03-17T06:26:34Z"}, {"author": "Deirdre Connolly", "text": "<p>No, X-Wing is a separate document</p>", "time": "2025-03-17T06:27:03Z"}, {"author": "Stephen Farrell", "text": "<p>but part of this story</p>", "time": "2025-03-17T06:27:17Z"}, {"author": "Stephen Farrell", "text": "<p>ah there we go</p>", "time": "2025-03-17T06:27:25Z"}, {"author": "Bas Westerbaan", "text": "<p>No, CFRG doesn't want it</p>", "time": "2025-03-17T06:27:26Z"}, {"author": "Deirdre Connolly", "text": "<p>The cfrg document specifies a P-256 concrete instance that is basically X-Wing with P-256 instead</p>", "time": "2025-03-17T06:27:28Z"}, {"author": "Stephen Farrell", "text": "<p>who was it wants x-wing in such a hurry btw?</p>", "time": "2025-03-17T06:27:49Z"}, {"author": "Martin Thomson", "text": "<p>A generic document is fine, because it sets out the guiderails.</p>", "time": "2025-03-17T06:27:59Z"}, {"author": "Martin Thomson", "text": "<p>An HPKE codepoint is already allocated.  We're done.</p>", "time": "2025-03-17T06:28:12Z"}, {"author": "Richard Barnes", "text": "<p>@Stephen for example, this whole debate is blocking PQ in MLS right now</p>", "time": "2025-03-17T06:28:14Z"}, {"author": "Richard Barnes", "text": "<p>because we don't want to do a TLS-style bespoke thing</p>", "time": "2025-03-17T06:28:23Z"}, {"author": "Martin Thomson", "text": "<p>A specific draft that says KitchenSick or whatever isn't helpful.</p>", "time": "2025-03-17T06:28:37Z"}, {"author": "Stephen Farrell", "text": "<p>so \"we're done\" and \"we're stuck\" both?</p>", "time": "2025-03-17T06:28:44Z"}, {"author": "Thom Wiggers", "text": "<p>twelve diverging ways of doing hybrids would be bad</p>", "time": "2025-03-17T06:28:46Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention\" data-user-id=\"526\">@Richard Barnes</span> more like can't, because HPKE, which uses registered KEMs</p>", "time": "2025-03-17T06:28:48Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"86\">Thom Wiggers</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150979\">said</a>:</p>\n<blockquote>\n<p>twelve diverging ways of doing hybrids would be bad</p>\n</blockquote>\n<p>\"i hate to inform you\"</p>", "time": "2025-03-17T06:28:57Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"526\">Richard Barnes</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150972\">said</a>:</p>\n<blockquote>\n<p>@Stephen for example, this whole debate is blocking PQ in MLS right now</p>\n</blockquote>\n<p>For example, this whole debate is NOT blocking PQ in LAMPS, IPSEC, OpenPGP because we can't wait.</p>", "time": "2025-03-17T06:28:59Z"}, {"author": "Martin Thomson", "text": "<p>X-Wing being a draft is a massive failure.  If the market has voted on X-Wing, we should standardize that.  It should not go to ISE.</p>", "time": "2025-03-17T06:29:42Z"}, {"author": "Stephen Farrell", "text": "<p>LAMPS is not exactly the model IETF WG IMO:-)</p>", "time": "2025-03-17T06:29:46Z"}, {"author": "Richard Barnes", "text": "<p>i guess MLS is the only one trying to do things properly here :)</p>", "time": "2025-03-17T06:29:55Z"}, {"author": "Christopher Wood", "text": "<p>To clarify what I said at the mic: we need HPKE code points. That is the only thing that matters.</p>", "time": "2025-03-17T06:30:00Z"}, {"author": "Martin Thomson", "text": "<p>MLS has a working group</p>", "time": "2025-03-17T06:30:03Z"}, {"author": "Christopher Wood", "text": "<p>(To me)</p>", "time": "2025-03-17T06:30:05Z"}, {"author": "Martin Thomson", "text": "<p>Chris, same here.</p>", "time": "2025-03-17T06:30:14Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150988\">said</a>:</p>\n<blockquote>\n<p>X-Wing being a draft is a massive failure.  If the market has voted on X-Wing, we should standardize that.  It should not go to ISE.</p>\n</blockquote>\n<p>Hence what about a CEWG (crypto engineering working group)</p>", "time": "2025-03-17T06:30:16Z"}, {"author": "Stephen Farrell", "text": "<p>x-wing has a codepoint; not sure the spec if 100% done though (it may be haven't looked in a while)</p>", "time": "2025-03-17T06:30:28Z"}, {"author": "Christopher Wood", "text": "<p>X-Wing is stable at this point</p>", "time": "2025-03-17T06:30:40Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150998\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150988\">said</a>:</p>\n<blockquote>\n<p>X-Wing being a draft is a massive failure.  If the market has voted on X-Wing, we should standardize that.  It should not go to ISE.</p>\n</blockquote>\n<p>Hence what about a CEWG (crypto engineering working group)</p>\n</blockquote>\n<p>we could finally stop pretending that HPKE is not a standard</p>", "time": "2025-03-17T06:30:43Z"}, {"author": "Bas Westerbaan", "text": "<p>@Stephen Please have a look, I think it's mostly done.</p>", "time": "2025-03-17T06:30:46Z"}, {"author": "Raphael Robert", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/150994\">said</a>:</p>\n<blockquote>\n<p>MLS has a working group</p>\n</blockquote>\n<p>MLS cares about interop more than other WGs maybe</p>", "time": "2025-03-17T06:30:54Z"}, {"author": "Martin Thomson", "text": "<p>X-Wing might be a reasonable case for AD sponsorship, through the IETF rather than this group, which seems incapable of agreeing on anything</p>", "time": "2025-03-17T06:30:55Z"}, {"author": "Stephen Farrell", "text": "<p>@chris: \"is stable\" doesn't mean the text is done</p>", "time": "2025-03-17T06:31:01Z"}, {"author": "Richard Barnes", "text": "<p>i have literally gotten several emails asking when we're going to make HPKE a standard</p>", "time": "2025-03-17T06:31:07Z"}, {"author": "Christopher Wood", "text": "<p>@Stephen, sure, but for the purposes of interop, it's sufficient.</p>", "time": "2025-03-17T06:31:24Z"}, {"author": "Martin Thomson", "text": "<p>Maybe we can make a new HPKE-Rubberstamp Working Group.</p>", "time": "2025-03-17T06:31:36Z"}, {"author": "Christopher Wood", "text": "<p>TBH, a working group to maintain HPKE is not a bad idea. It could incorporate Deirdre's suggestions for \"HPKEv2\", for example, in addition to dealing with matters such as algorithm codepoints</p>", "time": "2025-03-17T06:32:08Z"}, {"author": "Martin Thomson", "text": "<p>Two tasks: Move HPKE to standards track; define PQ-Hybrid KEMs</p>", "time": "2025-03-17T06:32:08Z"}, {"author": "Stephen Farrell", "text": "<p>\"it's sufficient\" vs an RFC is a thing on which many of us disagree variously</p>", "time": "2025-03-17T06:32:14Z"}, {"author": "Richard Barnes", "text": "<p>So wait, what was the outcome of that last session?</p>", "time": "2025-03-17T06:32:28Z"}, {"author": "Martin Thomson", "text": "<p>The work left on HPKE is 100% IETF work at this stage.</p>", "time": "2025-03-17T06:32:30Z"}, {"author": "Christopher Wood", "text": "<p><span aria-label=\"shrug\" class=\"emoji emoji-1f937\" role=\"img\" title=\"shrug\">:shrug:</span></p>", "time": "2025-03-17T06:32:34Z"}, {"author": "Stephen Farrell", "text": "<p>HPKE doesn't need a WG: TLS and MLS could do what's needed but yes it shouldn't be CFRG</p>", "time": "2025-03-17T06:32:52Z"}, {"author": "Christopher Wood", "text": "<p>@Martin, shall we work on a charter for HPKEWG?</p>", "time": "2025-03-17T06:32:58Z"}, {"author": "Martin Thomson", "text": "<p>Chris, yes, let's</p>", "time": "2025-03-17T06:33:11Z"}, {"author": "Christopher Wood", "text": "<p>Great <span aria-label=\"+1\" class=\"emoji emoji-1f44d\" role=\"img\" title=\"+1\">:+1:</span></p>", "time": "2025-03-17T06:33:18Z"}, {"author": "Richard Barnes", "text": "<p>@martin don't totally agree that HPKE is just engineering.  As Dierdre's HPKE + ML-KEM work demonstrates, there are some crypto subtleties</p>", "time": "2025-03-17T06:33:24Z"}, {"author": "Alexey Melnikov", "text": "<p>@Richard: I think \"to be continued\". Lots of input and no clear consensus, IMHO</p>", "time": "2025-03-17T06:33:25Z"}, {"author": "Mike Ounsworth", "text": "<p>Also JOSE / COSE uses (or wants to use HPKE). So then do we need to decide which of those 4 WGs canonically owns HPKE?</p>", "time": "2025-03-17T06:33:37Z"}, {"author": "Deirdre Connolly", "text": "<p>Also I'll advertise my presentation later today at PQUIP touching on ~all these points: <a href=\"https://datatracker.ietf.org/meeting/122/materials/slides-122-pquip-ietf-is-quantum-fragile-00.pdf\">https://datatracker.ietf.org/meeting/122/materials/slides-122-pquip-ietf-is-quantum-fragile-00.pdf</a></p>", "time": "2025-03-17T06:33:47Z"}, {"author": "Bas Westerbaan", "text": "<p>@MT @CAW An HPKE specific PQ hybrid KEM might make choicesthat make it annoying for others to use. For instance by using the DHKEM construction. What label in the context to use, etc.</p>", "time": "2025-03-17T06:33:55Z"}, {"author": "Stephen Farrell", "text": "<p>COSE/JOSE do debate that endlessly - is anyone actually using?</p>", "time": "2025-03-17T06:33:59Z"}, {"author": "Deirdre Connolly", "text": "<p>d</p>\n<p><span class=\"user-mention silent\" data-user-id=\"526\">Richard Barnes</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151042\">said</a>:</p>\n<blockquote>\n<p>@martin don't totally agree that HPKE is just engineering.  As Dierdre's HPKE + ML-KEM work demonstrates, there are some crypto subtleties</p>\n</blockquote>\n<p>This is not HPKE, though, HPKE just 'needs a KEM', beyond that abstraction is cryptography engineering about KEMs</p>", "time": "2025-03-17T06:34:21Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151047\">said</a>:</p>\n<blockquote>\n<p>COSE/JOSE do debate that endlessly - is anyone actually using?</p>\n</blockquote>\n<p>Umm, yes. JWT is the most common bearer token format on the internet.</p>", "time": "2025-03-17T06:34:30Z"}, {"author": "Stephen Farrell", "text": "<p>I asked about using HPKE, so if that wasn't clear</p>", "time": "2025-03-17T06:34:52Z"}, {"author": "Stephen Farrell", "text": "<p>s/so/sorry/</p>", "time": "2025-03-17T06:34:59Z"}, {"author": "Mike Ounsworth", "text": "<p>Well, I don't think HPKE-in-JWT/CWT has actually been published yet, right? It's being floated as the easiest path to getting ML-KEM into JOSE/COSE, right?</p>", "time": "2025-03-17T06:35:42Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"603\">Deirdre Connolly</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151049\">said</a>:</p>\n<blockquote>\n<p>d</p>\n<p><span class=\"user-mention silent\" data-user-id=\"526\">Richard Barnes</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151042\">said</a>:</p>\n<blockquote>\n<p>@martin don't totally agree that HPKE is just engineering.  As Dierdre's HPKE + ML-KEM work demonstrates, there are some crypto subtleties</p>\n</blockquote>\n<p>This is not HPKE, though, HPKE just 'needs a KEM', beyond that abstraction is cryptography engineering about KEMs</p>\n</blockquote>\n<p>Although  my previous investigations about the previous security assumptions based on DHKEM when trying to replace that with ML-KEM may agree with you, there are cryptographic subleties when keeping up with the latest research etc</p>", "time": "2025-03-17T06:35:43Z"}, {"author": "Stephen Farrell", "text": "<p>\"being floated\" - I bailed on the discussion after the 2nd thousand messages:-)</p>", "time": "2025-03-17T06:36:36Z"}, {"author": "Thom Wiggers", "text": "<p>I'm very ready for Deirdre's announced PQUIP rant <span aria-label=\"fire\" class=\"emoji emoji-1f525\" role=\"img\" title=\"fire\">:fire:</span></p>", "time": "2025-03-17T06:37:27Z"}, {"author": "Stephen Farrell", "text": "<p>where do we do the \"too much PQ too soon\" rant?</p>", "time": "2025-03-17T06:37:52Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151072\">said</a>:</p>\n<blockquote>\n<p>where do we do the \"too much PQ too soon\" rant?</p>\n</blockquote>\n<p>PQUIP is probably the right forum. PQUIP 123?</p>", "time": "2025-03-17T06:38:16Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151072\">said</a>:</p>\n<blockquote>\n<p>where do we do the \"too much PQ too soon\" rant?</p>\n</blockquote>\n<p>outside yelling at the clouds</p>", "time": "2025-03-17T06:38:29Z"}, {"author": "Daniel Gillmor", "text": "<p>PQUIP 123 would be \"too much PQ too soon\" too late</p>", "time": "2025-03-17T06:38:39Z"}, {"author": "Stephen Farrell", "text": "<p>yelling at clouds would be more productive than composite sigs I suppose;-(</p>", "time": "2025-03-17T06:39:21Z"}, {"author": "Thom Wiggers", "text": "<p>Regulatory stuff has happened already, that ship has sailed (though I have an obvious stake here)</p>", "time": "2025-03-17T06:39:38Z"}, {"author": "Stephen Farrell", "text": "<p>that ship: the vasa was a ship:-)</p>", "time": "2025-03-17T06:40:36Z"}, {"author": "Stephen Farrell", "text": "<p>it did sail for a little bit</p>", "time": "2025-03-17T06:40:51Z"}, {"author": "Theo de Raadt", "text": "<p>i sense too much \"perfect is the enemy of good\" slowing things down</p>", "time": "2025-03-17T06:41:13Z"}, {"author": "Michele Orr\u00f9", "text": "<p>post-quantum BBS pseudonyms hmmm I do have an AES proof that makes presentations <em>only</em> 80KB  <span aria-label=\"skull\" class=\"emoji emoji-1f480\" role=\"img\" title=\"skull\">:skull:</span></p>", "time": "2025-03-17T06:41:26Z"}, {"author": "Nick Sullivan", "text": "<p>@Chris Wood:</p>\n<p>Regarding your statement that HPKE, VOPRF, Blind RSA, VDAF, FROST, etc., don't fit in the diagram for the CFRG. I think those are actually great examples of work that does.</p>\n<p>HPKE problem: we don\u2019t know how to do hybrid encryption safely<br>\nVOPRF problem: we need a safe mechanism for blinded tokens<br>\nBlind RSA problem: we need a safe mechanism for blinded tokens with public validation<br>\nVDAF problem: we don\u2019t know how to do private aggregation<br>\nFROST problem: for this we adopted a topic, how to do threshold signatures, not a solution<br>\netc.</p>", "time": "2025-03-17T06:41:29Z"}, {"author": "Deirdre Connolly", "text": "<p>NIST: <a href=\"/user_uploads/2/d4/H0CQ34F6_d09uXCu9J7y4_v3/image.png\">image.png</a></p>\n<div class=\"message_inline_image\"><a href=\"/user_uploads/2/d4/H0CQ34F6_d09uXCu9J7y4_v3/image.png\" title=\"image.png\"><img src=\"/user_uploads/2/d4/H0CQ34F6_d09uXCu9J7y4_v3/image.png\"></a></div>", "time": "2025-03-17T06:42:14Z"}, {"author": "Deirdre Connolly", "text": "<p>(<a href=\"https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf\">https://nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdf</a>)</p>", "time": "2025-03-17T06:42:29Z"}, {"author": "Bas Westerbaan", "text": "<blockquote>\n<p>we don\u2019t know how to do hybrid encryption safely</p>\n</blockquote>\n<p>Even if you're correct, you're not making any progress on solving that.</p>", "time": "2025-03-17T06:42:42Z"}, {"author": "Deirdre Connolly", "text": "<p>Isn't hash to curve ~done?</p>", "time": "2025-03-17T06:42:44Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention\" data-user-id=\"3062\">@Nick Sullivan</span> could this maybe work if CFRG writes a \"spec\" and \"CEWG\" develops the instantiation? That could be either done sequentially or with more interaction between the two...</p>", "time": "2025-03-17T06:42:46Z"}, {"author": "Stephen Farrell", "text": "<p>hopefullly NIST won't be deprecated itself before those dates</p>", "time": "2025-03-17T06:42:48Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention silent\" data-user-id=\"549\">Bas Westerbaan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151101\">said</a>:</p>\n<blockquote>\n<blockquote>\n<p>we don\u2019t know how to do hybrid encryption safely</p>\n</blockquote>\n<p>Even if you're correct, you're not making any progress on solving that.</p>\n</blockquote>\n<p>hybrid encryption == key exchange + AES</p>", "time": "2025-03-17T06:43:02Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151104\">said</a>:</p>\n<blockquote>\n<p>hopefullly NIST won't be deprecated itself before those dates</p>\n</blockquote>\n<p>A non-zero possibility <span aria-label=\"disappointed\" class=\"emoji emoji-1f61e\" role=\"img\" title=\"disappointed\">:disappointed:</span></p>", "time": "2025-03-17T06:43:22Z"}, {"author": "Christopher Wood", "text": "<p>@Deirdre hash-to-curve is indeed done</p>", "time": "2025-03-17T06:43:33Z"}, {"author": "Stephen Farrell", "text": "<p>CEWG idea == bad idea</p>", "time": "2025-03-17T06:43:39Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"86\">Thom Wiggers</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151105\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"549\">Bas Westerbaan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151101\">said</a>:</p>\n<blockquote>\n<blockquote>\n<p>we don\u2019t know how to do hybrid encryption safely</p>\n</blockquote>\n<p>Even if you're correct, you're not making any progress on solving that.</p>\n</blockquote>\n<p>hybrid encryption == key exchange + AES</p>\n</blockquote>\n<p>isn't HPKE directly addressing this</p>", "time": "2025-03-17T06:43:40Z"}, {"author": "Thom Wiggers", "text": "<p>yeah exactly</p>", "time": "2025-03-17T06:44:05Z"}, {"author": "John Preu\u00df Mattsson", "text": "<p>At the moment, the NIST crypto team seems more active than ever <span aria-label=\"heart\" class=\"emoji emoji-2764\" role=\"img\" title=\"heart\">:heart:</span></p>", "time": "2025-03-17T06:44:43Z"}, {"author": "Stephen Farrell", "text": "<p>also WRT dates/regulation: what were the original UPv6 dates?</p>", "time": "2025-03-17T06:44:48Z"}, {"author": "Stephen Farrell", "text": "<p>s/UPv6/IPv6/</p>", "time": "2025-03-17T06:44:59Z"}, {"author": "Nick Sullivan", "text": "<p>I agree with Martin that the line between engineering and research can get blurry. We should be careful not to specify engineering specs, but the part of HPKE that reviews the security analysis of the engineering construction is useful work for the CFRG to produce.</p>", "time": "2025-03-17T06:45:06Z"}, {"author": "Stephen Farrell", "text": "<p>@nick: TLS and MLS WGs seem capable of asking CFRG when needed if adding new HPKE things</p>", "time": "2025-03-17T06:45:46Z"}, {"author": "Raphael Robert", "text": "<p>chairs: the queue is still locked</p>", "time": "2025-03-17T06:47:24Z"}, {"author": "Nick Sullivan", "text": "<p>The tricky part is developing the research in tandem with the engineering. It can be done (Privacy Pass, for example, was developed along CFRG work), but it requires strong editors and collaboration.</p>", "time": "2025-03-17T06:47:28Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"3062\">Nick Sullivan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151146\">said</a>:</p>\n<blockquote>\n<p>The tricky part is developing the research in tandem with the engineering. It can be done (Privacy Pass, for example, was developed along CFRG work), but it requires strong editors and collaboration.</p>\n</blockquote>\n<p>extremely true</p>", "time": "2025-03-17T06:48:18Z"}, {"author": "Daniel Gillmor", "text": "<p>is \"mediator\" just renamed \"attester\" in this slid?</p>", "time": "2025-03-17T06:48:48Z"}, {"author": "Valery Smyslov", "text": "<p>@Daniel Gilmor: do you want this question be relayed to the mic?</p>", "time": "2025-03-17T06:50:12Z"}, {"author": "Nick Sullivan", "text": "<p>Thank you, Richard, for volunteering to help with the editing of the KEM Combiners work. Let's make sure that this is included in the notes :)</p>", "time": "2025-03-17T06:50:18Z"}, {"author": "Daniel Gillmor", "text": "<p>nah, it's ok</p>", "time": "2025-03-17T06:50:20Z"}, {"author": "Deirdre Connolly", "text": "<p>Yes thank you <span class=\"user-mention\" data-user-id=\"526\">@Richard Barnes</span> <span aria-label=\"pray\" class=\"emoji emoji-1f64f\" role=\"img\" title=\"pray\">:pray:</span> <em>single editor collapses in a sweaty heap</em></p>", "time": "2025-03-17T06:51:14Z"}, {"author": "Nick Sullivan", "text": "<p>@stephen: yes, the CFRG, and the Crypto Panel in particular, is capable of providing the security considerations and references of WG docs that define code points</p>", "time": "2025-03-17T06:51:40Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"3062\">Nick Sullivan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151176\">said</a>:</p>\n<blockquote>\n<p>@stephen: yes, the CFRG, and the Crypto Panel in particular, is capable of providing the security considerations and references of WG docs that define code points</p>\n</blockquote>\n<p>hmm, do we have instances of how long this feedback cycle takes in the median case? (honestly curious)</p>", "time": "2025-03-17T06:52:29Z"}, {"author": "Stephen Farrell", "text": "<p>@nick: not sure what comment you're referring to there (I guess you're catching up)</p>", "time": "2025-03-17T06:52:38Z"}, {"author": "Nick Sullivan", "text": "<p>And for the notes again, Rohan Mahy volunteered to help with the writing of the KEM combiner documents.</p>", "time": "2025-03-17T06:53:07Z"}, {"author": "Michele Orr\u00f9", "text": "<p>MIC: thank you for your hard work. </p>\n<p>I checked the spec, and am concerned about the core scheme and anonymity. </p>\n<p>The core scheme is not CMZ. Where is the formal analysis of this different scheme? </p>\n<p>Concerning anonymity, it does not seem to satisfy the canonical definition of anonymity. What security definition do you satisfy? </p>\n<p>Would you be amenable to leaning to a proven construction?</p>", "time": "2025-03-17T06:53:15Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention\" data-user-id=\"5673\">@Michele Orr\u00f9</span>  can you join the question queue? good to raise</p>", "time": "2025-03-17T06:53:55Z"}, {"author": "Stephen Farrell", "text": "<p>FWIW I don't think MLS or TLS WGs need crypto-panel review for at least some HPKE code-point allocations and if what they're doing is controlversial (and needs more review) people will ask for that I'd say</p>", "time": "2025-03-17T06:54:05Z"}, {"author": "Valery Smyslov", "text": "<p>I will relay this question</p>", "time": "2025-03-17T06:54:14Z"}, {"author": "Nick Sullivan", "text": "<blockquote>\n<p>hmm, do we have instances of how long this feedback cycle takes in the median case? (honestly curious)</p>\n</blockquote>\n<p>CFRG has provided advice in an informal capacity in the past. It hasn't been tracked in the datatracker. The CFRG is a general forum.</p>", "time": "2025-03-17T06:55:18Z"}, {"author": "Deirdre Connolly", "text": "<p>Oof these three documents interlocking feels like it will take five years</p>", "time": "2025-03-17T06:55:41Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"3062\">Nick Sullivan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151200\">said</a>:</p>\n<blockquote>\n<blockquote>\n<p>hmm, do we have instances of how long this feedback cycle takes in the median case? (honestly curious)</p>\n</blockquote>\n<p>CFRG has provided advice in an informal capacity in the past. It hasn't been tracked in the datatracker. The CFRG is a general forum.</p>\n</blockquote>\n<p>gotcha, thanks</p>", "time": "2025-03-17T06:55:55Z"}, {"author": "Michele Orr\u00f9", "text": "<p>don't worry we move fast are all in line</p>", "time": "2025-03-17T06:55:57Z"}, {"author": "Michele Orr\u00f9", "text": "<p>*and are all in line</p>", "time": "2025-03-17T06:56:06Z"}, {"author": "Stephen Farrell", "text": "<p>@nick: CFRG has a problem though: too many docs and taking too long (as does e.g. LAMPS) to that's not an RG vs WG thing</p>", "time": "2025-03-17T06:56:08Z"}, {"author": "Stephen Farrell", "text": "<p>but it is a problem</p>", "time": "2025-03-17T06:56:27Z"}, {"author": "Stephen Farrell", "text": "<p>nit: ARC is a failed protocol for fixing how DMARC breaks mailing lists, dunno if the acronym clash is worth fixing or not</p>", "time": "2025-03-17T07:00:37Z"}, {"author": "Daniel Gillmor", "text": "<p>please do fix the acronym clash.</p>", "time": "2025-03-17T07:01:06Z"}, {"author": "Bas Westerbaan", "text": "<p>What about URC? U=unlinkable.</p>", "time": "2025-03-17T07:01:08Z"}, {"author": "Rohan Mahy", "text": "<p>the name sounds like a monster from dungeons and dragons</p>", "time": "2025-03-17T07:01:52Z"}, {"author": "Rohan Mahy", "text": "<p>(URC =&gt; orc)</p>", "time": "2025-03-17T07:02:08Z"}, {"author": "Stephen Farrell", "text": "<p>the other arc is RFC8617</p>", "time": "2025-03-17T07:02:09Z"}, {"author": "Rohan Mahy", "text": "<p>Anonymous Rate Limiting Credentials (ARLC)</p>", "time": "2025-03-17T07:03:08Z"}, {"author": "Bas Westerbaan", "text": "<p>Or RAC? Rate-limited ACs</p>", "time": "2025-03-17T07:03:28Z"}, {"author": "Steven Valdez", "text": "<p><span class=\"user-mention\" data-user-id=\"128\">@Christopher Wood</span> What are you imagining the scope of the cfrg-anonymous-credentials framework being? There seems to be a fuzzy line between what the engineering problems/properties of anonymous credentials are and the actual framework for the properties of the cryptographic components, the latter seems reasonable for CFRG but the former might be better in some WG?</p>", "time": "2025-03-17T07:04:26Z"}, {"author": "Christopher Wood", "text": "<p>@Steven: I envision the purpose of the document being the following:</p>\n<ol>\n<li>Describe the purpose and syntax of anonymous credentials, allowing space for publicly vs privately verifiable credentials, different extensions, and so on</li>\n<li>Describe security and privacy properties for credentials</li>\n<li>Survey various constructions and the different considerations for them</li>\n</ol>", "time": "2025-03-17T07:06:59Z"}, {"author": "Christopher Wood", "text": "<p>I don't know if that's super clear, but I would be willing to take a first stab at writing it to make this more concrete</p>", "time": "2025-03-17T07:07:20Z"}, {"author": "Christopher Wood", "text": "<p>(And would welcome input from anyone else who wants to help)</p>", "time": "2025-03-17T07:07:33Z"}, {"author": "Simone", "text": "<p>re: ARC<br>\nIn the presented schema in the slides, there were clear  overlaps between CMZ/BBS.</p>\n<p>A potential approach is to have a shared layer as CMZ/BBS are interchangeable. </p>\n<p>To optimize the effort of CFRG</p>", "time": "2025-03-17T07:07:47Z"}, {"author": "Cathie Yun", "text": "<p>Agreed, it is possible (and an open issue) to write ARC in relation to a generic MAC protocol: <a href=\"https://github.com/chris-wood/draft-arc/issues/8\">https://github.com/chris-wood/draft-arc/issues/8</a></p>", "time": "2025-03-17T07:09:15Z"}, {"author": "Thom Wiggers", "text": "<p>In light of earlier discussions: what is the research question here? It's getting standardized by ISO so what remains to be done except repeat the work</p>", "time": "2025-03-17T07:12:59Z"}, {"author": "Thom Wiggers", "text": "<p>or even s/repeat/rubber-stamp/</p>", "time": "2025-03-17T07:13:19Z"}, {"author": "Thom Wiggers", "text": "<p>(even recognizing that there is value in having non-paywalled standards)</p>", "time": "2025-03-17T07:13:37Z"}, {"author": "Martin Thomson", "text": "<p>I understand that we might want &gt;1 general purpose PQ KEM, but do we want one based on LWE?</p>", "time": "2025-03-17T07:15:39Z"}, {"author": "Mike Ounsworth", "text": "<p>ISO specs are pay-walled, right? So if we want to use the thing within IETF, we need a public version of the standard?<br>\nIE having an IETF spec that requires you to go pay for the details somewhere else is ... icky?</p>", "time": "2025-03-17T07:15:51Z"}, {"author": "Martin Thomson", "text": "<p>We've cited ISO specs before, but I think we strongly prefer not to.</p>", "time": "2025-03-17T07:16:14Z"}, {"author": "Martin Thomson", "text": "<p>open standards!</p>", "time": "2025-03-17T07:16:35Z"}, {"author": "Daniel Gillmor", "text": "<p>agreed, ISO paywalled specs are a bad thing.</p>", "time": "2025-03-17T07:16:50Z"}, {"author": "Steven Valdez", "text": "<p><span class=\"user-mention silent\" data-user-id=\"128\">Christopher Wood</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151273\">said</a>:</p>\n<blockquote>\n<p>@Steven: I envision the purpose of the document being the following:</p>\n<ol>\n<li>Describe the purpose and syntax of anonymous credentials, allowing space for publicly vs privately verifiable credentials, different extensions, and so on</li>\n<li>Describe security and privacy properties for credentials</li>\n<li>Survey various constructions and the different considerations for them</li>\n</ol>\n</blockquote>\n<p>1 and 3 make sense for a CFRG doc, 2 seems like a more difficult one to have concrete properties, since the requirements and therefore the acceptable constructions will be dependent on the protocols that are building on anonymous credentials. I'd imagine the uses in PrivacyPass are going to require stronger properties than something like SPICE/Auth WGs that may want to use something in this space.</p>", "time": "2025-03-17T07:19:10Z"}, {"author": "Robert Moskowitz", "text": "<p>In that case, AD sponsored?</p>", "time": "2025-03-17T07:20:05Z"}, {"author": "Martin Thomson", "text": "<p>Of the work that the CFRG does, the work I value most is in selecting the \"best\" algorithms.  Obviously, the NIST competition has sort of done that already, so the question is whether the CFRG might second-guess NIST.</p>", "time": "2025-03-17T07:20:21Z"}, {"author": "Stephen Farrell", "text": "<p>NIST are not the only gov with opinions</p>", "time": "2025-03-17T07:20:47Z"}, {"author": "Bas Westerbaan", "text": "<p>What are examplesof CFRG choosing the <em>best</em> thing?</p>", "time": "2025-03-17T07:20:54Z"}, {"author": "Bas Westerbaan", "text": "<p>Seems IExF in general has a hard time narrowing down options.</p>", "time": "2025-03-17T07:21:17Z"}, {"author": "Martin Thomson", "text": "<p>I didn't say best, I said \"best\"</p>", "time": "2025-03-17T07:21:22Z"}, {"author": "Bas Westerbaan", "text": "<p>*IxTF</p>", "time": "2025-03-17T07:21:24Z"}, {"author": "Bas Westerbaan", "text": "<p>@MT Sorry, I meant <em>one</em>not the best.</p>", "time": "2025-03-17T07:21:37Z"}, {"author": "Martin Thomson", "text": "<p>Yeah, this group is not great at narrowing things down.</p>", "time": "2025-03-17T07:21:58Z"}, {"author": "Martin Thomson", "text": "<p>see also what Dierdre is saying</p>", "time": "2025-03-17T07:22:14Z"}, {"author": "Bas Westerbaan", "text": "<p>:)</p>", "time": "2025-03-17T07:22:22Z"}, {"author": "Yoav Nir", "text": "<p>I think you'd have to go about 10 years back to ChaCha20-Poly1305</p>", "time": "2025-03-17T07:22:29Z"}, {"author": "Stephen Farrell", "text": "<p>see also hash based sigs:-(</p>", "time": "2025-03-17T07:22:31Z"}, {"author": "Martin Thomson", "text": "<p>much consistency!</p>", "time": "2025-03-17T07:24:14Z"}, {"author": "Stephen Farrell", "text": "<p>see also current slide (having a companion that differs;-)</p>", "time": "2025-03-17T07:25:21Z"}, {"author": "Christopher Wood", "text": "<p>@Steven yeah, that may be, but I think thinking about the different properties is a good use of this group's time.</p>", "time": "2025-03-17T07:25:35Z"}, {"author": "Martin Thomson", "text": "<p>KDF(SS1, SS1, CT1, PK1, CT2, PK2, label)</p>", "time": "2025-03-17T07:26:17Z"}, {"author": "Rohan Mahy", "text": "<p>Quantum Superiority Fighter</p>", "time": "2025-03-17T07:26:35Z"}, {"author": "Stephen Farrell", "text": "<p>and the reason we want two of these is...</p>", "time": "2025-03-17T07:26:50Z"}, {"author": "Daniel Gillmor", "text": "<p>...so we have something to argue about?</p>", "time": "2025-03-17T07:27:09Z"}, {"author": "Martin Thomson", "text": "<p>dkg++</p>", "time": "2025-03-17T07:27:16Z"}, {"author": "Martin Thomson", "text": "<p>ooooOOOOooooo 2kilobytes!</p>", "time": "2025-03-17T07:27:34Z"}, {"author": "Stephen Farrell", "text": "<p>some of us manage to argue even without that</p>", "time": "2025-03-17T07:27:36Z"}, {"author": "Stephen Farrell", "text": "<p>I'd be fine with one of these things</p>", "time": "2025-03-17T07:27:52Z"}, {"author": "Daniel Gillmor", "text": "<p>cost savings of 2KiB of hashing, in 2025\u2026not super compelling.</p>", "time": "2025-03-17T07:28:11Z"}, {"author": "Martin Thomson", "text": "<p>are there any KEMs that are PQ and not LEAK-WOSSNAME secure?</p>", "time": "2025-03-17T07:28:31Z"}, {"author": "Richard Barnes", "text": "<p>+1000 @dkg</p>", "time": "2025-03-17T07:28:58Z"}, {"author": "Stephen Farrell", "text": "<p>exactly which LEAK-&lt;name&gt; things are worthwhile isn't entirely clear</p>", "time": "2025-03-17T07:29:01Z"}, {"author": "Richard Barnes", "text": "<p>who tf cares about hashing</p>", "time": "2025-03-17T07:29:06Z"}, {"author": "Martin Thomson", "text": "<p>if not, hash all the things</p>", "time": "2025-03-17T07:29:14Z"}, {"author": "Stephen Farrell", "text": "<p>yep kitchen's need a sink but not a fictional space plan</p>", "time": "2025-03-17T07:29:39Z"}, {"author": "Stephen Farrell", "text": "<p>s/plan/plane/</p>", "time": "2025-03-17T07:29:50Z"}, {"author": "Bas Westerbaan", "text": "<p>@dkg It's actually a ~10% reduction in CPU cylces for the whole hybrid key agreement. ML-KEM and X25519 are surprisingly fast even compared to hashes.</p>", "time": "2025-03-17T07:30:01Z"}, {"author": "Christopher Wood", "text": "<p>@Richard y u hate hashes</p>", "time": "2025-03-17T07:30:03Z"}, {"author": "Daniel Gillmor", "text": "<p>also, KItchenSinkS = KISS</p>", "time": "2025-03-17T07:30:15Z"}, {"author": "Bas Westerbaan", "text": "<p>Whether that's important isa second.</p>", "time": "2025-03-17T07:30:18Z"}, {"author": "Richard Barnes", "text": "<p>au contraire, i &lt;3 hashes, want moar hashes</p>", "time": "2025-03-17T07:30:18Z"}, {"author": "Martin Thomson", "text": "<p>So there is also h(SS1, SS2, H(CT1, PK1), H(CT2, PK2), label)</p>", "time": "2025-03-17T07:30:20Z"}, {"author": "Christopher Wood", "text": "<p>@dkg: amazing</p>", "time": "2025-03-17T07:30:27Z"}, {"author": "Bas Westerbaan", "text": "<p>@MT, yes, that's chempat</p>", "time": "2025-03-17T07:30:41Z"}, {"author": "Martin Thomson", "text": "<p>bas, Yes, but Diedre seems to be ignoring that</p>", "time": "2025-03-17T07:31:13Z"}, {"author": "Stephen Farrell", "text": "<p>I'm +100 on only wanting 1 output</p>", "time": "2025-03-17T07:31:17Z"}, {"author": "Martin Thomson", "text": "<p>The point of this session should not be to present your idea, but work toward a resolution for a debate.</p>", "time": "2025-03-17T07:31:29Z"}, {"author": "Richard Barnes", "text": "<p>on a different topic -- are we using SHA3 here just to be cool?</p>", "time": "2025-03-17T07:31:36Z"}, {"author": "Christopher Wood", "text": "<p>@Stephen do you mean one combiner?</p>", "time": "2025-03-17T07:31:37Z"}, {"author": "Christopher Wood", "text": "<p>@Richard you said you wanted more hashes so we went with the bigger hash</p>", "time": "2025-03-17T07:31:49Z"}, {"author": "Stephen Farrell", "text": "<p>yep</p>", "time": "2025-03-17T07:31:49Z"}, {"author": "Daniel Gillmor", "text": "<p>Stephen, i get the sense that you (and i) are going to be disappointed</p>", "time": "2025-03-17T07:31:50Z"}, {"author": "Martin Thomson", "text": "<p>SHA3 has properties over SHA2 that are important in some of these, I believe.</p>", "time": "2025-03-17T07:31:57Z"}, {"author": "Bas Westerbaan", "text": "<p>@richard barnes: SHA3 is used already inside of ML-KEM, so it makes sense not to add another dependency</p>", "time": "2025-03-17T07:32:11Z"}, {"author": "Stephen Farrell", "text": "<p>@dkg: of course - people won't back down from their fav</p>", "time": "2025-03-17T07:32:14Z"}, {"author": "Mike Ounsworth", "text": "<p>Sorry, I'm in RATS and not seeing the presentation. What's the advantage of<br>\nh(SS1, SS2, H(CT1, PK1), H(CT2, PK2), label)<br>\nover<br>\nh(SS1, SS2, CT1, PK1, CT2, PK2, label)<br>\n?</p>", "time": "2025-03-17T07:32:55Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151423\">said</a>:</p>\n<blockquote>\n<p>SHA3 has properties over SHA2 that are important in some of these, I believe.</p>\n</blockquote>\n<p>If you do SHA2, then you need HMAC-SHA2</p>", "time": "2025-03-17T07:33:16Z"}, {"author": "Martin Thomson", "text": "<p>Mike: the advantage would be that you can save the hash and not have to run the hash over the large ciphertext every time.</p>", "time": "2025-03-17T07:33:32Z"}, {"author": "Stephen Farrell", "text": "<p>I'd prefer not allocating code points until we know if we want &gt;1 output</p>", "time": "2025-03-17T07:33:38Z"}, {"author": "Martin Thomson", "text": "<p>It's not a meaningful different to me.</p>", "time": "2025-03-17T07:33:39Z"}, {"author": "Bas Westerbaan", "text": "<p>Perf. Pag 20 of <a href=\"https://eprint.iacr.org/2024/039.pdf\">https://eprint.iacr.org/2024/039.pdf</a></p>", "time": "2025-03-17T07:34:21Z"}, {"author": "Martin Thomson", "text": "<p>this is not interoperable without a ;protocol</p>", "time": "2025-03-17T07:34:26Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151432\">said</a>:</p>\n<blockquote>\n<p>Mike: the advantage would be that you can save the hash and not have to run the hash over the large ciphertext every time.</p>\n</blockquote>\n<p>Although, what do you mean by \"every time\"? How often are you computing a KEM combiner without changing the ciphertext?</p>", "time": "2025-03-17T07:34:31Z"}, {"author": "Stephen Farrell", "text": "<p>I'm not very convinced by the performance issues for KEM combiners - we're also doing ECDH each time</p>", "time": "2025-03-17T07:35:13Z"}, {"author": "Martin Thomson", "text": "<p>mike: exactly</p>", "time": "2025-03-17T07:35:17Z"}, {"author": "Bas Westerbaan", "text": "<p>The difference is 10% just for ciphertext. With PK it's a bit more, so 20%?</p>", "time": "2025-03-17T07:36:10Z"}, {"author": "Stephen Farrell", "text": "<p>20% of what?</p>", "time": "2025-03-17T07:36:22Z"}, {"author": "Bas Westerbaan", "text": "<p>Encap and decap cycles</p>", "time": "2025-03-17T07:36:31Z"}, {"author": "Daniel Gillmor", "text": "<p>20% of the computational costs of sending a single advertisement to a single eyeball</p>", "time": "2025-03-17T07:36:45Z"}, {"author": "Stephen Farrell", "text": "<p>I do not agree that we want different KEM combiners</p>", "time": "2025-03-17T07:37:52Z"}, {"author": "Christopher Wood", "text": "<p>I think we should whittle this list down</p>", "time": "2025-03-17T07:38:02Z"}, {"author": "Christopher Wood", "text": "<p>Just because the draft has N&gt;1 doesn't mean it _needs_ to have N&gt;1</p>", "time": "2025-03-17T07:38:11Z"}, {"author": "Stephen Farrell", "text": "<p>...to 1</p>", "time": "2025-03-17T07:38:11Z"}, {"author": "Martin Thomson", "text": "<p>the whole kitchensink/qsf thing seems bad</p>", "time": "2025-03-17T07:38:19Z"}, {"author": "Richard Barnes", "text": "<p>@martin why?</p>", "time": "2025-03-17T07:38:51Z"}, {"author": "Daniel Gillmor", "text": "<p>multiple combiner options is a recipe for stubbed toes for ignorant implementers long into the future.</p>", "time": "2025-03-17T07:38:58Z"}, {"author": "Martin Thomson", "text": "<p>what others have said; one option</p>", "time": "2025-03-17T07:39:27Z"}, {"author": "Richard Barnes", "text": "<p>it seems like the doc says when it's ok to use QSF, which provides the instructions the ignorant implementor needs</p>", "time": "2025-03-17T07:39:39Z"}, {"author": "Thom Wiggers", "text": "<p>hot take: implementers should not look at this CFRG doc to construct their own, but look at docs that specify concrete instantiations</p>", "time": "2025-03-17T07:40:09Z"}, {"author": "Daniel Gillmor", "text": "<p>Richard, it tells the ignorant implementer that they need to understand more details about the specific components that they are importing.</p>", "time": "2025-03-17T07:40:12Z"}, {"author": "Stephen Farrell", "text": "<p>\"when it's ok to use QSF\" how much does it cost to explain all that over and over for decades?</p>", "time": "2025-03-17T07:40:16Z"}, {"author": "Martin Thomson", "text": "<p>how does an implementer decide that QSF is OK for, say, FrodoKEM?</p>", "time": "2025-03-17T07:40:24Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"637\">Daniel Gillmor</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151387\">said</a>:</p>\n<blockquote>\n<p>cost savings of 2KiB of hashing, in 2025\u2026not super compelling.</p>\n</blockquote>\n<p>tell Google that</p>", "time": "2025-03-17T07:40:25Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151389\">said</a>:</p>\n<blockquote>\n<p>are there any KEMs that are PQ and not LEAK-WOSSNAME secure?</p>\n</blockquote>\n<p>Yes</p>", "time": "2025-03-17T07:40:53Z"}, {"author": "Bas Westerbaan", "text": "<blockquote>\n<p>hot take: implementers should not look at this CFRG doc to construct their own, but look at docs that specify concrete instantiations</p>\n</blockquote>\n<p>Agreed. I wish we'd just specify two or three concrete hybrids and be done with it. Hybrids will not stick around forever anyway.</p>", "time": "2025-03-17T07:41:01Z"}, {"author": "Stephen Farrell", "text": "<p>my sympathy for google's specific problems is.... limited</p>", "time": "2025-03-17T07:41:10Z"}, {"author": "Martin Thomson", "text": "<p>I would prefer that we drop all concrete instantiations and let the protocols sort things out.</p>", "time": "2025-03-17T07:41:29Z"}, {"author": "Thom Wiggers", "text": "<p>These additional hash computations at scale amount to massive amounts of additional energy used</p>", "time": "2025-03-17T07:41:30Z"}, {"author": "Christopher Wood", "text": "<p>@MT how would you propose we address this for HPKE, then?</p>", "time": "2025-03-17T07:42:06Z"}, {"author": "Martin Thomson", "text": "<p>There are cases where components need all the options, which might be true for HPKE.  Otherwise, they can pick the one that is best for that protocol.</p>", "time": "2025-03-17T07:42:08Z"}, {"author": "Daniel Gillmor", "text": "<p>Thom: invasive advertising and surveillance uses many times more massive amounts of energy and yet the Googles of the world seem OK with those costs.</p>", "time": "2025-03-17T07:42:09Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151423\">said</a>:</p>\n<blockquote>\n<p>SHA3 has properties over SHA2 that are important in some of these, I believe.</p>\n</blockquote>\n<p>SHA3 is a secure KDF, SHA2 is not, HKDF-SHA256 is</p>", "time": "2025-03-17T07:42:14Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"500\">Mike Ounsworth</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151427\">said</a>:</p>\n<blockquote>\n<p>Sorry, I'm in RATS and not seeing the presentation. What's the advantage of<br>\nh(SS1, SS2, H(CT1, PK1), H(CT2, PK2), label)<br>\nover<br>\nh(SS1, SS2, CT1, PK1, CT2, PK2, label)<br>\n?</p>\n</blockquote>\n<p>design team did not see one that's why we didn't include it on top of KitchenSink</p>", "time": "2025-03-17T07:42:51Z"}, {"author": "Martin Thomson", "text": "<p>TLS, for example, has this sorted under the kitchensink model already.  That has basically resolved with one winner already.</p>", "time": "2025-03-17T07:42:59Z"}, {"author": "Stephen Farrell", "text": "<p>all the costs of KEM combiners are trivial compared to the traffic being protected - I don't buy the efficiency arguments at all</p>", "time": "2025-03-17T07:43:12Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"128\">Christopher Wood</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151460\">said</a>:</p>\n<blockquote>\n<p>Just because the draft has N&gt;1 doesn't mean it _needs_ to have N&gt;1</p>\n</blockquote>\n<p>So we can do a ThisIsOnlySecureForML-KEMAndThingsThatHaveTheSameSecurityPropertiesAsML-KEMCombiner(), and call that our 1 option. And let the future figure itself out.</p>", "time": "2025-03-17T07:43:19Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151432\">said</a>:</p>\n<blockquote>\n<p>Mike: the advantage would be that you can save the hash and not have to run the hash over the large ciphertext every time.</p>\n</blockquote>\n<p>You cannot save it, the ciphertext changes each time</p>", "time": "2025-03-17T07:43:28Z"}, {"author": "Deirdre Connolly", "text": "<p>The only thing in that construction you should be saving is the hybrid shared secret</p>", "time": "2025-03-17T07:43:46Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention silent\" data-user-id=\"500\">Mike Ounsworth</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151514\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"128\">Christopher Wood</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151460\">said</a>:</p>\n<blockquote>\n<p>Just because the draft has N&gt;1 doesn't mean it _needs_ to have N&gt;1</p>\n</blockquote>\n<p>So we can do a ThisIsOnlySecureForML-KEMAndThingsThatHaveTheSameSecurityPropertiesAsML-KEMCombiner(), and call that our 1 option. And let the future figure itself out.</p>\n</blockquote>\n<p>ITYM X-Wing</p>", "time": "2025-03-17T07:43:48Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"55\">Stephen Farrell</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151440\">said</a>:</p>\n<blockquote>\n<p>I'm not very convinced by the performance issues for KEM combiners - we're also doing ECDH each time</p>\n</blockquote>\n<p>I regret to inform you that ECC implementations are quite fast now</p>", "time": "2025-03-17T07:44:27Z"}, {"author": "Daniel Gillmor", "text": "<p>faster than hashing 2KiB?</p>", "time": "2025-03-17T07:45:00Z"}, {"author": "Martin Thomson", "text": "<p>so are hash implementations</p>", "time": "2025-03-17T07:45:02Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151474\">said</a>:</p>\n<blockquote>\n<p>how does an implementer decide that QSF is OK for, say, FrodoKEM?</p>\n</blockquote>\n<p>I/someone writes down the concrete construction for them</p>", "time": "2025-03-17T07:45:38Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention silent\" data-user-id=\"637\">Daniel Gillmor</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151492\">said</a>:</p>\n<blockquote>\n<p>Thom: invasive advertising and surveillance uses many times more massive amounts of energy and yet the Googles of the world seem OK with those costs.</p>\n</blockquote>\n<p>I would rather that they don't do that either, but that doesn't mean that we can't or shouldn't make general cryptography less expensive on the environment if we have the proofs and the opportunity.</p>", "time": "2025-03-17T07:45:46Z"}, {"author": "Stephen Farrell", "text": "<p>even ignoring dkg's fine point about ads, 2kb of javascript shite could much mor easilly be dropped</p>", "time": "2025-03-17T07:46:04Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151484\">said</a>:</p>\n<blockquote>\n<p>I would prefer that we drop all concrete instantiations and let the protocols sort things out.</p>\n</blockquote>\n<p>lmao</p>", "time": "2025-03-17T07:46:05Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"86\">Thom Wiggers</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151520\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"500\">Mike Ounsworth</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151514\">said</a>:</p>\n<blockquote>\n<p><span class=\"user-mention silent\" data-user-id=\"128\">Christopher Wood</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151460\">said</a>:</p>\n<blockquote>\n<p>Just because the draft has N&gt;1 doesn't mean it _needs_ to have N&gt;1</p>\n</blockquote>\n<p>So we can do a ThisIsOnlySecureForML-KEMAndThingsThatHaveTheSameSecurityPropertiesAsML-KEMCombiner(), and call that our 1 option. And let the future figure itself out.</p>\n</blockquote>\n<p>ITYM X-Wing</p>\n</blockquote>\n<p>Sure, if ML-KEM-768 + X25519 is the only combo you need. Otherwise I mean draft-ietf-lamps-pq-composite-kem.</p>", "time": "2025-03-17T07:46:12Z"}, {"author": "Jonathan Hoyland", "text": "<p>Channel binding!</p>", "time": "2025-03-17T07:47:04Z"}, {"author": "Daniel Gillmor", "text": "<p>Thom: the jet fuel alone from multiple IETFs where people travel to ask someone smart and trustworthy like Dierdre to bless their choices seems like it ought to be factored into these comparisons too.</p>", "time": "2025-03-17T07:47:11Z"}, {"author": "Martin Thomson", "text": "<p>shake256 is 7 cycles per byte on modern hardware; sha256 is 2; HMAC-SHA2 might be enough faster that SHA-3 isn't the best choice.</p>", "time": "2025-03-17T07:47:16Z"}, {"author": "Bas Westerbaan", "text": "<p>@dkg @MT Hashing 2kB with SHA3 is about 24k cycles on i7-11700K. MLKEM768+X25519 decaps is 116k cycles.</p>", "time": "2025-03-17T07:47:19Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151508\">said</a>:</p>\n<blockquote>\n<p>TLS, for example, has this sorted under the kitchensink model already.  That has basically resolved with one winner already.</p>\n</blockquote>\n<p>NO they do NOT - TLS 1.3 already includes everything in the protocol transcript in their key schedule, their hybrid 'combiner' is the simplest ss1 || ss2 because the protocol is already doing a split-key PRF style combiner in its key schedule</p>", "time": "2025-03-17T07:47:23Z"}, {"author": "Stephen Farrell", "text": "<p>IMO: if we end up with &gt;1 kem combiner scheme that'll be because of people's egos and not the science or engineering. And dkg is right: we probably will.</p>", "time": "2025-03-17T07:47:38Z"}, {"author": "Daniel Gillmor", "text": "<p>Bas: thank you for bringing concrete  measaurements!</p>", "time": "2025-03-17T07:47:53Z"}, {"author": "Martin Thomson", "text": "<p>Dierdre: that's a nitpick and  you know it</p>", "time": "2025-03-17T07:48:07Z"}, {"author": "Christopher Wood", "text": "<p>My prediction is three combiners: X-Wing, one with a NIST curve for ML-KEM-768, and one with a NIST curve for ML-KEM-1024</p>", "time": "2025-03-17T07:48:11Z"}, {"author": "Christopher Wood", "text": "<p>(I make no claim as to whether this is the best outcome)</p>", "time": "2025-03-17T07:48:34Z"}, {"author": "Deirdre Connolly", "text": "<p>The diversity of concrete instances is not 'egos' it's the diversity of deployed crypto and requirements being encoded into hybrids</p>", "time": "2025-03-17T07:48:35Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"26\">Martin Thomson</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151554\">said</a>:</p>\n<blockquote>\n<p>Dierdre: that's a nitpick and  you know it</p>\n</blockquote>\n<p>It's really not and it matters - the IETF is doing cryptography all over the place, not just CFRG</p>", "time": "2025-03-17T07:48:56Z"}, {"author": "Deirdre Connolly", "text": "<p>Good cryptographic design in TLS 1.3 allows easy solutions such as that one, old cryptographic design in other places in IETF forces more consideration into things like these hybrid kems over here in CFRG</p>", "time": "2025-03-17T07:49:38Z"}, {"author": "Mike Ounsworth", "text": "<p>\"TLS 1.3 Hyrbid is a KEM Combiner\" in the same way that a car is a motor. It certainly <em>includes</em> a motor, but if what I want is a motor to drive my kitchen food processor, then using a whole car seems overkill.<br>\nWe have other protocols that want a KEM combiner as a standalone component in isolation from all the other things that TLS does.</p>", "time": "2025-03-17T07:50:00Z"}, {"author": "Stephen Farrell", "text": "<p>do we have any other protocols that want more than one kem combiner scheme?</p>", "time": "2025-03-17T07:50:34Z"}, {"author": "Daniel Gillmor", "text": "<p>Bas: if you could provide a link to more details about where those numbers come from, that would be very useful.  (e.g. what specifically goes into the ML-KEM+X25519 computation?  is that with some particular combiner)?</p>", "time": "2025-03-17T07:50:52Z"}, {"author": "Thom Wiggers", "text": "<p>I think Bas already linked the paper earlier</p>", "time": "2025-03-17T07:51:30Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention silent\" data-user-id=\"549\">Bas Westerbaan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151435\">said</a>:</p>\n<blockquote>\n<p>Perf. Pag 20 of <a href=\"https://eprint.iacr.org/2024/039.pdf\">https://eprint.iacr.org/2024/039.pdf</a></p>\n</blockquote>\n<p>^</p>", "time": "2025-03-17T07:51:44Z"}, {"author": "Daniel Gillmor", "text": "<p>Thom, thx</p>", "time": "2025-03-17T07:52:07Z"}, {"author": "Quynh Dang", "text": "<p><a href=\"https://keccak.team/sw_performance.html\">https://keccak.team/sw_performance.html</a></p>", "time": "2025-03-17T07:52:08Z"}, {"author": "Thom Wiggers", "text": "<p>ARMv8.2a CPUs already have sha3 hardware extensions btw</p>", "time": "2025-03-17T07:52:43Z"}, {"author": "Bas Westerbaan", "text": "<p>@dkg What Thom said. I do have to add the obvious that I don't think performance is the most important consideration. I just want to push back against the idea that hashing is completely free.</p>", "time": "2025-03-17T07:53:53Z"}, {"author": "Christopher Wood", "text": "<p>This was a particularly spicy conversation. I think this group would benefit from a dedicated interim on the topic of combiners and the requirements and rationale that influence which combiners we work on (if any). We need a high bandwidth space to talk... this chat isn't it.</p>", "time": "2025-03-17T07:57:18Z"}, {"author": "Nick Sullivan", "text": "<p>Agreed, @chris wood.</p>", "time": "2025-03-17T07:58:22Z"}, {"author": "Alexey Melnikov", "text": "<p>We are officially over time, but hopefully the recording will not cut off in the middle of the last presentation</p>", "time": "2025-03-17T08:00:53Z"}, {"author": "Mike Ounsworth", "text": "<p><span class=\"user-mention silent\" data-user-id=\"128\">Christopher Wood</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151629\">said</a>:</p>\n<blockquote>\n<p>This was a particularly spicy conversation. I think this group would benefit from a dedicated interim on the topic of combiners and the requirements and rationale that influence which combiners we work on (if any). We need a high bandwidth space to talk... this chat isn't it.</p>\n</blockquote>\n<p>This sounds like creating bandwidth for combiners. I like. I like a lot.</p>", "time": "2025-03-17T08:01:02Z"}, {"author": "Thom Wiggers", "text": "<p>NTRU != NTRU Prime by the way</p>", "time": "2025-03-17T08:01:48Z"}, {"author": "Bas Westerbaan", "text": "<p>Did I miss an IPR disclosure?</p>", "time": "2025-03-17T08:02:02Z"}, {"author": "Thom Wiggers", "text": "<p>So this is a different scheme from the one deployed by e.g. <del>OpenSSL</del> OpenSSH</p>", "time": "2025-03-17T08:02:03Z"}, {"author": "Stephen Farrell", "text": "<p>you mean openssh?</p>", "time": "2025-03-17T08:02:14Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"549\">Bas Westerbaan</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151672\">said</a>:</p>\n<blockquote>\n<p>Did I miss an IPR disclosure?</p>\n</blockquote>\n<p>for which</p>", "time": "2025-03-17T08:02:15Z"}, {"author": "Daniel Gillmor", "text": "<p>itym OpenSSH, no?</p>", "time": "2025-03-17T08:02:16Z"}, {"author": "Thom Wiggers", "text": "<p>yes, my bad</p>", "time": "2025-03-17T08:02:21Z"}, {"author": "Daniel Gillmor", "text": "<p>for ML-KEM</p>", "time": "2025-03-17T08:02:22Z"}, {"author": "Deirdre Connolly", "text": "<p>You did not miss one</p>", "time": "2025-03-17T08:02:45Z"}, {"author": "Thom Wiggers", "text": "<p>NTRU was supposed to be covered by the same patents as ML-KEM according to certain cryptographers</p>", "time": "2025-03-17T08:02:58Z"}, {"author": "Deirdre Connolly", "text": "<p><span class=\"user-mention silent\" data-user-id=\"86\">Thom Wiggers</span> <a href=\"#narrow/stream/267-cfrg/topic/ietf-122/near/151683\">said</a>:</p>\n<blockquote>\n<p>NTRU was supposed to be covered by the same patents as ML-KEM according to certain cryptographers</p>\n</blockquote>\n<p>hahahahaah</p>", "time": "2025-03-17T08:03:05Z"}, {"author": "Thom Wiggers", "text": "<p><span aria-label=\"man shrugging\" class=\"emoji emoji-1f937-200d-2642\" role=\"img\" title=\"man shrugging\">:man_shrugging:</span></p>", "time": "2025-03-17T08:03:15Z"}, {"author": "Stephen Farrell", "text": "<p>doesn't NTRU predate the filings though (if the original NTRU)</p>", "time": "2025-03-17T08:03:17Z"}, {"author": "Deirdre Connolly", "text": "<p>ha i'm scanning NTRU 2019 spec and its binding properties on first glance look...poor</p>", "time": "2025-03-17T08:03:46Z"}, {"author": "Deirdre Connolly", "text": "<p><a href=\"https://ntru.org/f/ntru-20190330.pdf\">https://ntru.org/f/ntru-20190330.pdf</a></p>", "time": "2025-03-17T08:04:08Z"}, {"author": "Deirdre Connolly", "text": "<p><a href=\"/user_uploads/2/f9/eKihrwBLwMabXE-soQUf8i3j/image.png\">image.png</a></p>\n<div class=\"message_inline_image\"><a href=\"/user_uploads/2/f9/eKihrwBLwMabXE-soQUf8i3j/image.png\" title=\"image.png\"><img src=\"/user_uploads/2/f9/eKihrwBLwMabXE-soQUf8i3j/image.png\"></a></div>", "time": "2025-03-17T08:04:16Z"}, {"author": "Deirdre Connolly", "text": "<p>OFC, if it lacks an FO transform</p>", "time": "2025-03-17T08:04:24Z"}, {"author": "Deirdre Connolly", "text": "<p>'lmao'</p>", "time": "2025-03-17T08:04:34Z"}, {"author": "Thom Wiggers", "text": "<p>the FO transform is line 3-5 right?</p>", "time": "2025-03-17T08:05:05Z"}, {"author": "Thom Wiggers", "text": "<p>oh wait where is encrypt</p>", "time": "2025-03-17T08:05:22Z"}, {"author": "Stephen Farrell", "text": "<p>the agreement with NIST that they only published parts of</p>", "time": "2025-03-17T08:05:56Z"}, {"author": "Thom Wiggers", "text": "<p>NTRU Prime is sloooooow</p>", "time": "2025-03-17T08:06:47Z"}, {"author": "Daniel Gillmor", "text": "<p>thanks all!</p>", "time": "2025-03-17T08:07:30Z"}, {"author": "Thom Wiggers", "text": "<p><span class=\"user-mention\" data-user-id=\"603\">@Deirdre Connolly</span> I think DPKE_Decrypt might be hiding the FO</p>", "time": "2025-03-17T08:07:36Z"}, {"author": "Thom Wiggers", "text": "<p>the NIST submission definitely had FO</p>", "time": "2025-03-17T08:07:43Z"}]