Skip to content

Commit

Permalink
Rename
Browse files Browse the repository at this point in the history
  • Loading branch information
dconnolly committed Sep 9, 2024
1 parent fd124ea commit d0df3f9
Show file tree
Hide file tree
Showing 2 changed files with 118 additions and 89 deletions.
118 changes: 118 additions & 0 deletions draft-irtf-cfrg-hybrid-kems.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,118 @@
---
###
# Internet-Draft Markdown Template
#
# Rename this file from draft-todo-yourname-protocol.md to get started.
# Draft name format is "draft-<yourname>-<workgroup>-<name>.md".
#
# For initial setup, you only need to edit the first block of fields.
# Only "title" needs to be changed; delete "abbrev" if your title is short.
# Any other content can be edited, but be careful not to introduce errors.
# Some fields will be set automatically during setup if they are unchanged.
#
# Don't include "-00" or "-latest" in the filename.
# Labels in the form draft-<yourname>-<workgroup>-<name>-latest are used by
# the tools to refer to the current version; see "docname" for example.
#
# This template uses kramdown-rfc: https://github.com/cabo/kramdown-rfc
# You can replace the entire file if you prefer a different format.
# Change the file extension to match the format (.xml for XML, etc...)
#
###
title: "Hybrid PQ/T Key Encapsulation Mechanisms"
abbrev: hybrid-kems
category: info

docname: draft-irtf-cfrg-hybrid-kems-latest
submissiontype: IRTF
consensus: false
v: 3
workgroup: Crypto Forum Research Group

author:
-
fullname: Deirdre Connolly
organization: SandboxAQ
email: [email protected]

-
ins: B.E. Westerbaan
fullname: Bas Westerbaan
organization: Cloudflare
email: [email protected]

-
name: Britta Hale
org: Naval Postgraduate School
email: [email protected]

normative:

informative:


--- abstract

TODO Abstract


--- middle

# Introduction

we propose "Hybrid PQ/T Key Encapsulation Mechanisms", which will cover the following.

(A) Identify which KEM security properties are IETF-relevant, and provide a terse overview of those
security properties (eg. IND-CCA, LEAK-BIND-K-PK, HON-BIND-K-CT, etc), as well as security
properties unique to hybrid KEMs (component key material reuse between hybrid and non-hybrid uses or
between multiple hybrids, one component is malicious while the other is honest, etc) with reference
to literature, and put into context with real-world attacks. From that, give guidance on a sensible
baseline.

(B) Provide a terse overview of well-reviewed techniques that are options to safely produce the
concrete combinations in (C), and which security properties are achieved given those of the
constituents.

(C) Provide an initial number of explicit PQ/T hybrid KEMs using techniques from (B) that reach the
baseline set in (A), in a separate document, and should include:

(I) a hybrid of P-256 and ML-KEM-768,
(II) a hybrid of X25519 and ML-KEM-768, and,
(III) a hybrid of P-384 and ML-KEM-1024.

These hybrids should be accompanied by pseudocode and test vectors.

This list includes two options at the ~128-bit security level (due to
current implementation/deployment trends) and one at a higher level.

The DT would be happy for the RG to omit C(I) above should there not be
significant implementations for which C(II) and C(III) are hard. The DT
did not attempt to survey implementations to determine this.

There is demand for other hybrid variants that either use different
primitives (RSA, NTRU, Classic McEliece, FrodoKEM), parameters, or that
use a combiner optimized for a specific use case. The DT recommends the
work outlined in (C) is done in a first document, and other use cases
could be covered in subsequent documents.

# Conventions and Definitions

{::boilerplate bcp14-tagged}


# Security Considerations

TODO Security


# IANA Considerations

This document has no IANA actions.


--- back

# Acknowledgments
{:numbered="false"}

TODO acknowledge.
89 changes: 0 additions & 89 deletions draft-todo-yourname-protocol.md

This file was deleted.

0 comments on commit d0df3f9

Please sign in to comment.