Internet-Draft | PQ Composite Keys | May 2023 |
Ounsworth & Gray | Expires 30 November 2023 | [Page] |
The migration to post-quantum cryptography is unique in the history of modern digital cryptography in that neither the old outgoing nor the new incoming algorithms are fully trusted to protect data for the required data lifetimes. The outgoing algorithms, such as RSA and elliptic curve, may fall to quantum cryptalanysis, while the incoming post-quantum algorithms face uncertainty about both the underlying mathematics as well as hardware and software implementations that have not had sufficient maturing time to rule out classical cryptanalytic attacks and implementation bugs.¶
Cautious implementers may wish to layer cryptographic algorithms such that an attacker would need to break all of them in order to compromise the data being protected using either a Post-Quantum / Traditional Hybrid, Post-Quantum / Post-Quantum Hybrid, or combinations thereof. This document, and its companions, defines a specific instantiation of hybrid paradigm called "composite" where multiple cryptographic algorithms are combined to form a single key, signature, or key encapsulation mechanism (KEM) such that they can be treated as a single atomic object at the protocol level.¶
This document defines the structure CompositeCiphertextValue which is a sequence of the respective ciphertexts for each component algorithm. Explicit pairings of algorithms are defined which should meet most Internet needs. For the purpose of combining KEMs, the combiner function from [I-D.ounsworth-cfrg-kem-combiners] is used.¶
This document is intended to be coupled with the composite keys structure define in [I-D.ounsworth-pq-composite-keys] and the CMS KEMRecipientInfo mechanism in [I-D.housley-lamps-cms-kemri].¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 30 November 2023.¶
Copyright (c) 2023 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
During the transition to post-quantum cryptography, there will be uncertainty as to the strength of cryptographic algorithms; we will no longer fully trust traditional cryptography such as RSA, Diffie-Hellman, DSA and their elliptic curve variants, while we may also not fully trust their post-quantum replacements until they have had sufficient scrutiny and time to discover and fix implementation bugs. Unlike previous cryptographic algorithm migrations, the choice of when to migrate and which algorithms to migrate to, is not so clear. Even after the migration period, it may be advantageous for an entity's cryptographic identity to be composed of multiple public-key algorithms.¶
The deployment of composite public keys and composite encryption using post-quantum algorithms will face two challenges¶
This document provides a mechanism to address algorithm strength uncertainty by building on [I-D.ounsworth-pq-composite-keys] by providing the format and process for combining multiple cryptographic algorithms into a single key encapsulation operation. Backwards compatibility is not directly covered in this document, but is the subject of Appendix B.1.¶
This document is intended for general applicability anywhere that key establishment or enveloped content encryption is used within PKIX or CMS structures.¶
The composite algorithm combinations defined in this document were chosen according to the following guidelines:¶
To maximize interoperability, use of the specific algorithm combinations specified in this document is encouraged. If other combinations are needed, a separate specification should be submitted to the IETF LAMPS working group. To ease implementation, these specifications are encouraged to follow the construction pattern of the algorithms specified in this document.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
This document is consistent with all terminology from [I-D.driscoll-pqt-hybrid-terminology].¶
In addition, the following terms are used in this document:¶
BER: Basic Encoding Rules (BER) as defined in [X.690].¶
CLIENT: Any software that is making use of a cryptographic key. This includes a signer, verifier, encrypter, decrypter.¶
COMBINER: A combiner specifies how multiple shared secrets are combined into a single shared secret. DER: Distinguished Encoding Rules as defined in [X.690].¶
KEM: A key encapsulation mechanism as defined in Section 3.1.¶
PKI: Public Key Infrastructure, as defined in [RFC5280].¶
SHARED SECRET: A value established between two communicating parties for use as cryptographic key material, but which cannot be learned by an active or passive adversary. This document is concerned with shared secrets established via public key cryptagraphic operations.¶
We borrow here the definition of a key encapsulation mechanism (KEM) from [I-D.ietf-tls-hybrid-design], in which a KEM is a cryptographic primitive that consists of three algorithms:¶
This document is not concerned with the KeyGen() algorithm of a KEM, but it is included above for completeness.¶
The KEM interface defined above differs from both traditional key transport mechanism (for example for use with KeyTransRecipientInfo defined in [RFC5652]), and key agreement (for example for use with KeyAgreeRecipientInfo defined in [RFC5652]).¶
The KEM interface was chosen as the interface for a composite key exchange because it allows for arbitrary combinations of component algorithm types since both key transport and key agreement mechanisms can be promoted into KEMs in the following ways:¶
A key transport mechanism can be transformed into a KEM.Encaps(pk) by generating a random shared secret ss and performing KeyTrans.Encrypt(pk, ss) -> ct; and into a KEM.Decaps(sk, ct) by KeyTrans.Decrypt(sk, ct) -> ss. This follows the pattern of RSA-KEM [RFC5990].¶
A key agreement mechanism can be transformed into a KEM.Encaps(pk) by generating an ephemeral key pair (pk_e, sk_e), and performing KeyAgree(pk, sk_e) -> (ss, pk_e); and into a KEM.Decaps(sk, ct) by completing the key agreement as KeyAgree(pk_e, sk) -> ss.¶
A composite KEM allows two or more underlying key transport, key agreement, or KEM algorithms to be combined into a single cryptographic operations by performing each operation, transformed to a KEM as outline above, and using a specified combiner function to combine the two or more component shared secrets into a single shared secret.¶
The main security property for KEMs is indistinguishability under adaptive chosen ciphertext attack (IND-CCA2), which means that shared secret values should be indistinguishable from random strings even given the ability to have other arbitrary ciphertexts decapsulated. By using the KEM combiner defined in [I-D.ounsworth-cfrg-kem-combiners], the composite KEMs defined in this document inherit the IND-CCA2 security from the general combiner.¶
TODO: needs more formal analysis that the methods of transforming KeyTrans and KeyAgree meet this.¶
The ASN.1 algorithm object for a composite KEM is:¶
kema-CompositeKEM KEM-ALGORITHM ::= { IDENTIFIER TYPE OBJECT IDENTIFIER VALUE CompositeCiphertextValue PARAMS TYPE CompositeKemParams ARE required PUBLIC-KEYS { pk-Composite } SMIME-CAPS { IDENTIFIED BY id-alg-composite } }¶
The following is an explanation how KEM-ALGORITHM elements are used to create Composite KEMs:¶
SIGNATURE-ALGORITHM element | Definition |
---|---|
IDENTIFIER | The Object ID used to identify the composite Signature Algorithm |
VALUE | The Sequence of BIT STRINGS for each component signature value |
PARAMS | Parameters of type CompositeKemParams may be provided when required |
PUBLIC-KEYS | The composite key required to produce the composite signature |
SMIME_CAPS | Not needed for composite |
A composite KEM MAY be associated with a composite public key as defined in [I-D.ounsworth-pq-composite-keys], but MAY also be associated with multiple public keys from different sources, for example multiple X.509 certificates, or multiple cryptographic modules. In the latter case, composite KEMs MAY be used as the mechanism for carrying multiple ciphertexts in a non-composite hybrid encryption equivalent of those described for digital signatures in [I-D.becker-guthrie-noncomposite-hybrid-auth].¶
The compositeCipherTextValue is a concatenation of the ciphertexts of the underlying component algorithms. It is represented in ASN.1 as follows:¶
CompositeCiphertextValue ::= SEQUENCE SIZE (2..MAX) OF OCTET STRING¶
Composite KEM parameters are defined as follows and MAY be included when a composite KEM algorithm is used with an AlgorithmIdentifier:¶
CompositeKemParams ::= SEQUENCE SIZE (2..MAX) OF AlgorithmIdentifier{ KEM-ALGORITHM, {KEMAlgSet} }¶
The KEM's CompositeKemParams
sequence MUST contain the same component algorithms listed in the same order as in the associated CompositePublicKey.¶
For explicit composite algorithms, it is required in cases where one or both of the components themselves have parameters that need to be carried, however the authors have chosen to always carry it in order to simplify parsers. Implementation SHOULD NOT rely directly on the algorithmIDs contained in the CompositeKemParams
and SHOULD verify that they match the algorithms expected from the overall composite AlgorithmIdentifier.¶
Many protocol specifications will require that composite KEM data structures be represented by an octet string or bit string.¶
When an octet string is required, the DER encoding of the composite data structure SHALL be used directly.¶
EDNOTE: will this definition include an ASN.1 tag and length byte inside the OCTET STRING object? If so, that's probably an extra unnecessary layer.¶
When a bit string is required, the octets of the DER encoded composite data structure SHALL be used as the bits of the bit string, with the most significant bit of the first octet becoming the first bit, and so on, ending with the least significant bit of the last octet becoming the last bit of the bit string.¶
In the interests of simplicity and avoiding compatibility issues, implementations that parse these structures MAY accept both BER and DER.¶
TODO: as per https://www.enisa.europa.eu/publications/post-quantum-cryptography-integration-study section 4.2, might need to specify behaviour in light of KEMs with a non-zero failure probility.¶
This document follows the construction of [I-D.ounsworth-cfrg-kem-combiners], which is repeated here for clarity:¶
KDF(counter || k_1 || ... || k_n || fixedInfo, outputBits) where k_i = H(ss_i || ct_i)¶
where:¶
KDF
and H
, and outputBits
represent a hash functions suitable to the chosen KEMs,¶
fixedInfo
any additional context string provided by the protocol,¶
counter
is fixed to the 32-bit value 0x00000001
,¶
||
represents concatenation.¶
Each registered composite KEM algorithm must specify the exact KEM combiner construction that is to be used.¶
For convenience we define the following KMAC-basid intantiations of KEM combiner:¶
KEM Combiner | KDF | H | outputBits |
---|---|---|---|
KMAC128/256 | KMAC128 | SHA3-256 | 256 |
KMAC256/384 | KMAC256 | SHA3-512 | 384 |
KMAC256/512 | KMAC256 | SHA3-512 | 512 |
KMAC is defined in NIST SP 800-185 [SP800-185]. The KMAC(K, X, L, S)
parameters are instantiated as follows:¶
K
: the ASCI value of the name of the Kem Type OID.¶
X
: the value "0x00000001 || k_1 || ... || k_n || fixedInfo
", where k_i = H(ss_i || ct_i)
, as defined above.¶
L
: integer representation of outputBits
.¶
S
: empty string.¶
~~~ BEGIN EDNOTE ~~~¶
these choices are somewhat arbitrary but aiming to match security level of the input KEMs. Feedback welcome.¶
~~~ END EDNOTE ~~~¶
For example, the KEM combiner instantiation of the first entry of Table 3 would be:¶
ss = KMAC128("id-Kyber512-ECDH-P256-KMAC128", 0x00000001 || SHA3-256(ss_1 || ct_1) || SHA3-256(ss_2 || ct_2) || fixedInfo, 256, "")¶
This table summarizes the list of explicit composite Signature algorithms by the key and signature OID and the two component algorithms which make up the explicit composite algorithm. These are denoted by First Signature Alg, and Second Signature Alg.¶
The OID referenced are TBD and MUST be used only for prototyping and replaced with the final IANA-assigned OIDS. The following prefix is used for each: replace <CompKEM> with the String "2.16.840.1.114027.80.5.2"¶
Therefore <CompKEM>.1 is equal to 2.16.840.1.114027.80.5.2.1¶
The "KEM Combiner" column refers to the definitions in Section 3.7.¶
KEM Type OID | OID | First Algorithm | Second Algorithm | KEM Combiner |
---|---|---|---|---|
id-Kyber512-ECDH-P256-KMAC128 | <CompKEM>.1 | Kyber512 | ECDH-P256 | KMAC128/256 |
id-Kyber512-ECDH-brainpoolP256r1-KMAC128 | <CompKEM>.2 | Kyber512 | ECDH-brainpoolp256r1 | KMAC128/256 |
id-Kyber512-X25519-KMAC128 | <CompKEM>.3 | Kyber512 | X25519 | KMAC128/256 |
id-Kyber768-RSA-KMAC256 | <CompKEM>.4 | Kyber768 | RSA-KEM | KMAC256/384 |
id-Kyber768-ECDH-P256-KMAC256 | <CompKEM>.5 | Kyber768 | ECDH-P256 | KMAC256/384 |
id-Kyber768-ECDH-brainpoolP256r1-KMAC256 | <CompKEM>.6 | Kyber768 | ECDH-brainpoolp256r1 | KMAC256/384 |
id-Kyber768-X25519-KMAC256 | <CompKEM>.7 | Kyber768 | X25519 | KMAC256/384 |
id-Kyber1024-ECDH-P384-KMAC256 | <CompKEM>.8 | Kyber1024 | ECDH-P384 | KMAC256/512 |
id-Kyber1024-ECDH-brainpoolP384r1-KMAC256 | <CompKEM>.9 | Kyber1024 | ECDH-brainpoolP384r1 | KMAC256/512 |
id-Kyber1024-X448-KMAC256 | <CompKEM>.10 | Kyber1024 | X448 | KMAC256/512 |
The table above contains everything needed to implement the listed explicit composite algorithms, with the exception of some special notes found below in this section. See the ASN.1 module in section Section 5 for the explicit definitions of the above Composite signature algorithms.¶
Full specifications for the referenced algorithms can be found as follows:¶
ECDH: There does not appear to be a single IETF definition of ECDH, so we refer to the following:¶
EDNOTE: I believe that [SP.800-56Ar3] and [BSI-ECC] give equivalent and interoperable algorithms, so maybe this is extranuous detail to include?¶
Use of RSA-KEM [RFC5990] deserves a special explanation.¶
GenericHybridParameters
is defined in [RFC5990], repeated here for clarity:¶
GenericHybridParameters ::= { kem KeyEncapsulationMechanism, dem DataEncapsulationMechanism }¶
The GenericHybridParameters.kem
MUST be id-kem-rsa
as defined in [RFC5990]:¶
id-kem-rsa OID ::= { is18033-2 key-encapsulation-mechanism(2) rsa(4) }¶
The associated parameters for id-kem-rsa have type RsaKemParameters:¶
RsaKemParameters ::= { keyDerivationFunction KeyDerivationFunction, keyLength KeyLength }¶
For use with id-Kyber768-RSA-KMAC256
, the keyDerivationFunction
SHALL be id-sha3-384
and keyLength
SHALL be 384
.¶
EDNOTE: I'm borrowing id-sha3-384
from draft-turner-lamps-adding-sha3-to-pkix-00, which looks ilke was abandoned. Do we have PKIX OIDs for SHA3?¶
EDNOTE: Since the crypto is fixed, we could omit the parameters entirely and expect implementations to re-constitute the params structures as necessary in order to call into lower-level crypto libraries.¶
TODO: there must be a way to put all this the ASN.1 Module rather than just specifying it as text?¶
<CODE STARTS> !!Composite-KEM-2023.asn <CODE ENDS>¶
The following need to be assigned by IANA:¶
Composite-KEM-2023
¶
TODO¶
Traditionally, a public key, certificate, or signature contains a single cryptographic algorithm. If and when an algorithm becomes deprecated (for example, RSA-512, or SHA1), it is obvious that structures using that algorithm are implicitly revoked.¶
In the composite model this is less obvious since implementers may decide that certain cryptographic algorithms have complementary security properties and are acceptable in combination even though one or both algorithms are deprecated for individual use. As such, a single composite public key, certificate, signature, or ciphertext may contain a mixture of deprecated and non-deprecated algorithms.¶
Specifying behaviour in these cases is beyond the scope of this document, but should be considered by Implementers and potentially in additional standards.¶
EDNOTE: Max is working on a CRL mechanism to accomplish this.¶
This document uses directly the KEM Combiner defined in [I-D.ounsworth-cfrg-kem-combiners] and therefore inherits all of its security considerations, which the authors believe have all been addressed in the concrete choices for explicit composites.¶
TBD¶
This section addresses practical issues of how this draft affects other protocols and standards.¶
EDNOTE 10: Possible topics to address:¶
As noted in the introduction, the post-quantum cryptographic migration will face challenges in both ensuring cryptographic strength against adversaries of unknown capabilities, as well as providing ease of migration. The composite mechanisms defined in this document primarily address cryptographic strength, however this section contains notes on how backwards compatibility may be obtained.¶
The term "ease of migration" is used here to mean that existing systems can be gracefully transitioned to the new technology without requiring large service disruptions or expensive upgrades. The term "backwards compatibility" is used here to mean something more specific; that existing systems as they are deployed today can interoperate with the upgraded systems of the future.¶
These migration and interoperability concerns need to be thought about in the context of various types of protocols that make use of X.509 and PKIX with relation to key establishment and content encryption, from online negotiated protocols such as TLS 1.3 [RFC8446] and IKEv2 [RFC7296], to non-negotiated asynchronous protocols such as S/MIME signed email [RFC8551], as well as myriad other standardized and proprietary protocols and applications that leverage CMS [RFC5652] encrypted structures.¶
~~~ BEGIN EDNOTE ~~~ In the context of encryption, K-of-N modes could mean one of two things:¶
Type 1: sender uses a subset¶
This would mean the sender (encrypter) uses a subset of K the N component keys within the receiver's public key. The obvious way to combine them is with skipping the unused keys / algorithms and emitting a NULL ciphertext in their place. This mechanism is straight-forward and allows ease of migration where a sender encounters a composite encryption public key where it does not support all component algorithms. It also supports performance optimization where, for example, a receiver can be issued a key with many component keys and a sender can choose the highest-performance subset that are still considered safe.¶
Type 2: receiver uses a subset¶
This would mean that the sender (encrypter) uses all N of the component keys within the receiver's public key in such a way that the receiver (decrypter) only needs to use K private keys to decrypt the message. This implies the need for some kind of Shamir's-like secret splitting scheme. This is a reasonably complex mechanism and it's currently unclear if there are any use-cases that require such a mechanism.¶
~~~ END EDNOTE ~~~¶
We present the term "Parallel PKI" to refer to the setup where a PKI end entity possesses two or more distinct public keys or certificates for the same identity (name), but containing keys for different cryptographic algorithms. One could imagine a set of parallel PKIs where an existing PKI using legacy algorithms (RSA, ECC) is left operational during the post-quantum migration but is shadowed by one or more parallel PKIs using pure post quantum algorithms or composite algorithms (legacy and post-quantum).¶
Equipped with a set of parallel public keys in this way, a client would have the flexibility to choose which public key(s) or certificate(s) to use in a given signature operation.¶
For negotiated protocols, the client could choose which public key(s) or certificate(s) to use based on the negotiated algorithms.¶
For non-negotiated protocols, the details for obtaining backwards compatibility will vary by protocol, but for example in CMS [RFC5652].¶
EDNOTE: I copied and pruned this text from [I-D.ounsworth-pq-composite-sigs]. It probably needs to be fleshed out more as we better understand the implementation concerns around composite encryption.¶
The following IPR Disclosure relates to this draft:¶
https://datatracker.ietf.org/ipr/3588/¶
EDNOTE: I don't think this applies to this draft.¶
This document incorporates contributions and comments from a large group of experts. The Editors would especially like to acknowledge the expertise and tireless dedication of the following people, who attended many long meetings and generated millions of bytes of electronic mail and VOIP traffic over the past year in pursuit of this document:¶
Serge Mister (Entrust), Ali Noman (Entrust), Scott Fluhrer (Cisco), Jan Klaussner (D-Trust), Max Pala (CableLabs), and Douglas Stebila (University of Waterloo).¶
We are grateful to all, including any contributors who may have been inadvertently omitted from this list.¶
This document borrows text from similar documents, including those referenced below. Thanks go to the authors of those documents. "Copying always makes things easier and less error prone" - [RFC8411].¶
Additional contributions to this draft are welcome. Please see the working copy of this draft at, as well as open issues at:¶
https://github.com/EntrustCorporation/draft-composite-kem/¶