The to-be-signed data is defined in 2.15 of RFC7296 or 3.3.2 of RFC9242 (in case of hybrid KE is used), it varies but I would say in the range of 500 ~ 2k bytes, it gets bigger when PQC KEM (like ML-KEM) is used as initial KE; correct me if I was wrong, I think this range is similar ballpark range of to-be-signed data (tbsCertificate) of a composite cert
From: Scott Fluhrer (sfluhrer) <[email protected]> Sent: Friday, July 25, 2025 11:31 AM To: Falko Strenzke <[email protected]>; Daniel Van Geest <[email protected]>; Jun Hu (Nokia) <[email protected]>; [email protected]; [email protected] Subject: Re: [IPsec] Re: comment on signature combiner / key reuse in draft-hu-ipsecme-pqt-hybrid-auth-02 CAUTION: This is an external email. Please be very careful when clicking links or opening attachments. See the URL nok.it/ext for additional information. As a coauthor of the LAMPS composite signature draft, let me explain the reasoning we did a more complicated structure: * Doing this simple construction (signing the message separately by the two methods), it would require an implementation to hash the message twice (because the two signature algorithms will require distinct hashes. Even if they use the same hash function, ML-DSA logically prefixes the message with a fixed string, while RSA or ECDSA signatures do not. * We did not know the length of the messages being signed; it is potentially lengthy * Because of that, we decided to perform a fixed hash, and have each algorithm sign that hash (prefixed by some other stuff) The reason I mention this is to allow the IPsecME working group to decide whether the same constraints apply to you, and whether it would make sense to follow that, or to do something simpler. ________________________________ From: Falko Strenzke <[email protected]<mailto:[email protected]>> Sent: Friday, July 25, 2025 5:10 AM To: Daniel Van Geest <[email protected]<mailto:[email protected]>>; Jun Hu (Nokia) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>> Subject: [IPsec] Re: comment on signature combiner / key reuse in draft-hu-ipsecme-pqt-hybrid-auth-02 With "parallel signatures" I meant to use a composite signature sign_A(key_A, M) || sign_B(key_B, M) instead of the LAMPS combiner. I didn't mean using non-composite (i.e., multiple certificates). Falko Am 25.07.25 um 10:03 schrieb Daniel Van Geest: I don't think it's plausible to provide support for parallel signature chains and then expect people to not use a chain individually. An advantage of parallel chains is that you can maintain a traditional algorithm chain for backwards compatibility with peers who haven't yet been upgraded to PQ. And similarly, when it's time to sunset traditional algorithm you can just stop using the traditional chain an only use the already-deployed PQ chain. Daniel On 2025-07-25 7:26 a.m., Jun Hu (Nokia) wrote: Thanks for your comment, just to clarify, there is no intention to and people should not reuse key between composite key and separate key; and I don't expect people will actually do that in typical actual deployments; there is already some text in the security consideration of the draft regarding the key reuse, but I will make it more clear in next revision. From: Falko Strenzke <[email protected]><mailto:[email protected]> Sent: Thursday, July 24, 2025 5:52 PM To: [email protected]<mailto:[email protected]>; [email protected]<mailto:[email protected]> Subject: comment on signature combiner / key reuse in draft-hu-ipsecme-pqt-hybrid-auth-02 I have a comment on the presentation of draft-hu-ipsecme-pqt-hybrid-auth-02 in the session today. On the slides<https://datatracker.ietf.org/meeting/123/materials/slides-123-ipsecme-post-quantum-traditional-hybrid-pki-authentication-in-ikev2-00#page=8> it says that it is intended to allow key-reuse among standalone and composite keys with the currently proposed LAMPS signature combiner<https://www.ietf.org/archive/id/draft-ietf-lamps-pq-composite-sigs-07.html>. The reason that is given there is that the context parameter that is set should mitigate the security concerns in this case. I want to raise awareness that the signature combiner that you are using will exhibit a principal signature forgery vulnerability in the scenario where an attacker downgrades the composite key to a traditional-only key. In that case the forged message takes the specific form of the message representative M' in the LAMPS composite sig draft<https://www.ietf.org/archive/id/draft-ietf-lamps-pq-composite-sigs-07.html#section-3.2-1>. The context parameter that is intended to be used by the authors doesn't prevent this. I don't understand enough about IPsec to say whether the described downgrade like this is possible. I suggest that the authors verify this. Generally, I recommend that the authors choose the signature combiner based on an evaluation of its security features. Even if it can be ruled out that the forged messages are meaningful protocol messages, there might be problems when a formal verification of the protocol is conducted. I don't think that this combiner is suitable for other protocols in general. The mere fact that its use entails further security analysis is reason enough to be careful in my view. Possibly, using straightforward parallel signatures is the better choice in your case. Falko -- MTG AG Dr. Falko Strenzke Phone: +49 6151 8000 24 E-Mail: [email protected]<mailto:[email protected]> Web: mtg.de<https://www.mtg.de/> ________________________________ MTG AG - Dolivostr. 11 - 64293 Darmstadt, Germany Commercial register: HRB 8901 Register Court: Amtsgericht Darmstadt Management Board: Jürgen Ruf (CEO), Tamer Kemeröz Chairman of the Supervisory Board: Dr. Thomas Milde This email may contain confidential and/or privileged information. If you are not the correct recipient or have received this email in error, please inform the sender immediately and delete this email.Unauthorised copying or distribution of this email is not permitted. Data protection information: Privacy policy<https://www.mtg.de/en/privacy-policy> _______________________________________________ IPsec mailing list -- [email protected]<mailto:[email protected]> To unsubscribe send an email to [email protected]<mailto:[email protected]> -- MTG AG Dr. Falko Strenzke Phone: +49 6151 8000 24 E-Mail: [email protected]<mailto:[email protected]> Web: mtg.de<https://www.mtg.de/> ________________________________ MTG AG - Dolivostr. 11 - 64293 Darmstadt, Germany Commercial register: HRB 8901 Register Court: Amtsgericht Darmstadt Management Board: Jürgen Ruf (CEO), Tamer Kemeröz Chairman of the Supervisory Board: Dr. Thomas Milde This email may contain confidential and/or privileged information. If you are not the correct recipient or have received this email in error, please inform the sender immediately and delete this email.Unauthorised copying or distribution of this email is not permitted. Data protection information: Privacy policy<https://www.mtg.de/en/privacy-policy>
_______________________________________________ IPsec mailing list -- [email protected] To unsubscribe send an email to [email protected]
