Thanks, John.

My comments inline.

Guilin

发件人:John Mattsson 
<[email protected]<mailto:[email protected]>>
收件人:Wang Guilin 
<[email protected]<mailto:[email protected]>>;Simo
 Sorce <[email protected]<mailto:[email protected]>>;Lucas Prabel 
<[email protected]<mailto:[email protected]>>;Orie 
<[email protected]<mailto:[email protected]>>
抄 送:jose <[email protected]<mailto:[email protected]>>;jose-chairs 
<[email protected]<mailto:[email protected]>>;cose 
<[email protected]<mailto:[email protected]>>;Wang Guilin 
<[email protected]<mailto:[email protected]>>
时 间:2025-10-18 15:33:53
主 题:Re: [jose] Re: Call for Adoption request: 
draft-prabel-jose-pq-composite-sigs-04

I agree with many of the comments regarding the complexity of hybrid 
signatures. In practice, hybrid signatures are significantly more complex than 
hybrid KEMs.

--------------
GL' comments: Great. Yes, hybrid signatures is much more complex than hybrid 
KEMs, as the latter normally do not use certificates.
--------------


>Choice C: Hybrid (including dual or composite signatures etc), which is a 
>conservative and balanced approach, but also an improving one.

If hybrid signatures are to be deployed today or in the future, I do notthink 
those specified in draft-ietf-lamps-pq-composite-sigs or 
draft-prabel-jose-pq-composite-sigs should be used. Theyare not improving ones, 
they are guaranteed to reduce the proven SUF-CMA security of ML-DSA to trivial 
attacks.

--------------
GL' comments: For SUF-CMA security, it is nice as we are together working on a 
draft now (to be submitted by 20 Oct, I think).

But personal opinion is still the same: It is very important and SHOULD 
highlight the difference between SUF-CMA and EUF-CMA security. But, just from 
now raising the bar to SUF-CMA security seems too hurry and aggressive. In 
paricular, neither NIST nor ISO lists SUF-CMA as the security requirement for 
PQ sinature algorithms for standardizing. The Chinese new NGCC does lists it, 
but as an optional property.

However, working on such a draft should be good as some applications may need 
it now or soon.
--------------

NIST’s statements in SP 800-227 regarding composite KEMs apply equally to 
composite signatures:

“A well-constructed composite KEM C[Π1, Π2] should preserve the security 
properties of its component KEMs Π1 and Π2.”
"Therefore, NIST encourages the use of key combiners that generically preserve 
IND-CCA security"

--------------
GL' comments: Nice to know this.
--------------

The properties you want from aPQ/T hybrid changes over time:

- Pre-2024: PQC not standardized and should be seen as contributing zero 
security. Security relies on Traditional. Important that the hybrid does not 
weaken the security of Traditional.
- 2024-2035: It's complicated
- Post-2035: Traditional disallowed and should be seen as contributing zero 
security. Security relies on PQC. Important that the hybrid does not weaken the 
security of PQC.

The composites in draft-ietf-lamps-pq-composite-sigs and 
draft-prabel-jose-pq-composite-sigs wereok before 2024. However, I don’t think 
anyone should deploy them today, and I believe they should be disallowed by 
2035, alongside RSASSA-PKCS1-v1_5.

--------------
GL' comments: Yes, as you mentioned "2039-2035: It's complicated". My previous 
explains why I think hybrid is particularky important for such uncertain 
periods.

"The composites in draft-ietf-lamps-pq-composite-sigs and 
draft-prabel-jose-pq-composite-sigs were ok before 2024."

"Before 2024"? I think you mean "before 2035". Right?

"However, I don’t think anyone should deploy them today, "

The message sent by John Gary today says that they have customers using/asking 
composite signatures. I also know several companies are considering to deploy 
their own PKIs with composite signatures or HBS schemes.
--------------

Cheers,
John
(as an individual)

From:Wang Guilin 
<[email protected]<mailto:[email protected]>>
Date: Saturday, 18 October 2025 at 08:21
To: Simo Sorce <[email protected]<mailto:[email protected]>>, Lucas Prabel 
<[email protected]<mailto:[email protected]>>, Orie 
<[email protected]<mailto:[email protected]>>, John Mattsson 
<[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>, 
[email protected]<mailto:[email protected]> 
<[email protected]<mailto:[email protected]>>, cose 
<[email protected]<mailto:[email protected]>>, Wang Guilin 
<[email protected]<mailto:[email protected]>>
Subject: RE: [jose] Re: Call for Adoption request: 
draft-prabel-jose-pq-composite-sigs-04
Do not agree several points about the value of hybrid and its complexity.

> And for short term protection there is no point in dual signatures, if a CRQC 
> is available the classic part is irrelevant. And until a CRQC is available 
> the QR part is redundant.

The point is: Customers (and also professionals, like experts here) do not 
exactly know when CRQC will be available. So, there is a long period up to 
years for such uncertainty. For example, if this uncertain period is 2030-2035, 
what customers should do in 2030 or 2031?

- Choice A: Just keep traditional cryptography for the services and systems, 
but do nothing on PQ migration. Then, they may lost their business soon due to 
either their competitors supporting PQ or losing their business in reality for 
CRQC appearance.

- Choice B: Migrate to pure PQ solution from now. Yes, good. However, the 
majority of professionals (at least in IETF and cryptography community) do 
think that PQ algorithms are not yet as mature as traditional ones. So just bet 
on the security of one single PQ algorithm may be risky. I would like to assign 
a probability of 10^{-2} for such a risk, if a number is good for illustration, 
while a mature traditional algorithm may just have the risk probability like 
10^{-3} or even 10^{-4}.

- Choice C: Hybrid (including dual or composite signatures etc), which is a 
conservative and balanced approach, but also an improving one. (PQUIP has 
several good documents on this line). The simplest reason for this hybrid is 
that it can improve practical security level, i.e., reduce risk probability. 
For a right hybrid solution, once the above traditional algorithm and PQ 
algorithm are used via hybrid, the resulting services or systems will only have 
only risk probability as low as 10^{-5} or even 10^{-6}. Namely, risk only 
happens if both algorithms fails. This is actually a huge security improvement, 
compared with the risk probability of 10^{-2} for pure PQC solution, in this 
simulated setting. After a number years of time testing, such systems can 
update to pure PQ algorithm or even PQ+PQ hybrid solution when a CRQC arrives 
ore nearly arrives. In particular, businesses demanding high security will 
benefit from hybrid.

(I would like to call this as a little new "theory" about PQ migration. I will 
be happy to explain more later.)

The blog at 
https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.cr.yp.to%2F20251004-weakened.html&data=05%7C02%7Cjohn.mattsson%40ericsson.com%7C0f2aff835a7146969b9b08de0e0e7fa5%7C92e84cebfbfd47abbe52080c6b87953f%7C0%7C0%7C638963652603692944%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=XtiHa18NEVSjb%2BJW0hbhFF12CD%2FFWRqChdOGlDhCXd4%3D&reserved=0<https://blog.cr.yp.to/20251004-weakened.html>
 gives much more reasons and cases with details, on a similar topic: "It's 
normal for post-quantum cryptography to be rolled out as an extra layer of 
security on top of traditional pre-quantum cryptography, rather than as a 
replacement."

Yes, just like you, many may say Choice C (Hybrid) will increase migration 
complexity.

> I think this will just add complexity with no value, complexity means more 
> bugs and more ways to screw up, and must always be justified.

Yes, complexity or performance overhead will be introduced. But, it may be not 
that much. As I remember, both AWS and Cloudflare did some experiments a few 
years ago, which showed that network performance for employing PQ (or hybrid) 
normally drops something like 10%. By considering the continuous hardware 
updates, this is not a big issue. In real application, migration complexity is 
tightly related to soft engineering, it would be hard to analyze in a simple 
way. However, at the protocol level (the target of IETF), I do think it is not 
too much complex, compared with pure PQ solution. Three examples.

1) TLS takes concatenation way to do hybrid key exchange (KE), so this mainly 
means to add a new KE algorithm ID for a hybrid algorithm combination (say 
ECDH+ML-KEM). It do not introduce essential change for either the TLS protocol 
or implementation/crypto library.

2) IKEv2 does this differently as the first IKE_SA_INIT exchanges can not be 
fragmented. So, PQ KEMs will be run after ECDH has been run first. Though this 
introduces more interactions between two peers, IPSECME WG reached its 
consensus on this approach and published RFC 9370, in May 2023.

3) The last one, Composite ML-DSA for use in X.509 Public Key Infrastructure 
(draft-ietf-lamps-pq-composite-sigs-12). It is well known in IETF that this is 
a tough work for the author team and also for the group. However, IMO, here are 
the two main reasons: a) ML-DSA defined two private key formats and several 
variants for this "one" particular PQ signature algorithm. b) It is the first 
try for defining PKI with composite or hybrid signatures. For future ones, a 
lot of experience learned will be helpful and save our energy.

> - If a CRQC is expected soon all this work is net overhead for basically no 
> gain as classic signatures will be obsolete quickly, and going though 
> composite signatures will cause dual migrations classic -> composite -> 
> pureQR, which is operationally expensive and doubles the pain.

"If a CRQC is expected soon ... ": This just one case, with very small 
probability. So, more is about the case if a CRQC will come 10 or 15 years 
later. We and customers should concern much more for this case, as it is 
expected to happen with big (if not overwhelming) probability. As explained the 
above, "soon all this work is net overhead for basically no gain .." may not 
really true, as hybrid improves system security level, and also boosts the 
research and standardization of generic hybrid approaches, including PQ+PQ 
solutions.

First of all, " dual migrations" and "composite" may be treated in the same 
category, as both are concrete ways of realizing hybrid. "will cause dual 
migrations classic -> composite -> pureQR, which is operationally expensive and 
doubles the pain." Not really, if my explanation the above sounds right. From 
now, it may be more practical to expect that all those approaches will be 
supported simultaneously in most applications. So, essentially one surgery for 
all pain. For those with strong confidence in a single PQ algorithm, no 
problem, just go ahead, if they have no concern on the issues like the 
difference between risk probability of 10^{-2} and 10^{-5}.

> - If a CRQC is not expected soon, then rushing into composites is also not 
> useful, it is better to stay on a classic signature until the time pureQR are 
> trustworthy enough to do the migration once.

The above explained already. The PQ migration has a long period of uncertainty. 
A lot of customers may like to brace the benefits of both traditional 
cryptography and PQ algorithms, especially in this long uncertain period.

> Because I do not see a cryptographic relevant justification I am somewhat 
> against adding composite signatures to JOSE (can't speak about COSE because I 
> am not as familiar with its application space).

Read the above blog and several documents in PQUIP should help, I think. On the 
other hand, this document does not give much justification why PQ or why hybrid 
approach, as it supposes that the background more or less like explained the 
above.

Guilin

-----Original Message-----
From: Simo Sorce 
<[email protected]<mailto:[email protected]>>
Sent: Saturday, 18 October 2025 3:42 am
To: Lucas Prabel 
<[email protected]<mailto:[email protected]>>; 
Orie <[email protected]<mailto:[email protected]>>; John Mattsson 
<[email protected]<mailto:[email protected]>>
Cc: [email protected]<mailto:[email protected]>; 
[email protected]<mailto:[email protected]>; cose 
<[email protected]<mailto:[email protected]>>
Subject: [jose] Re: Call for Adoption request: 
draft-prabel-jose-pq-composite-sigs-04

Lucas,
while LAMPS may have different needs, I do not understand what composites bring 
to JOSE or COSE, the JWT and JWS tokens are generally short-lived entities, 
therefore there is no need for long term protection against CRQC.

And for short term protection there is no point in dual signatures, if a CRQC 
is available the classic part is irrelevant. And until a CRQC is available the 
QR part is redundant.

I think this will just add complexity with no value, complexity means more bugs 
and more ways to screw up, and must always be justified.

Additionally, in terms of timing:

- If a CRQC is expected soon all this work is net overhead for basically no 
gain as classic signatures will be obsolete quickly, and going though composite 
signatures will cause dual migrations classic -> composite -> pureQR, which is 
operationally expensive and doubles the pain.

- If a CRQC is not expected soon, then rushing into composites is also not 
useful, it is better to stay on a classic signature until the time pureQR are 
trustworthy enough to do the migration once.

Note that for a PKI infrastructure that provides CA certificates that have a 
long life the considerations may be quite different, so LAMPS has more reasons 
to entertain composite signatures at least for CA certificates.

Because I do not see a cryptographic relevant justification I am somewhat 
against adding composite signatures to JOSE (can't speak about COSE because I 
am not as familiar with its application space).

Simo.

On Fri, 2025-10-17 at 15:35 +0000, Lucas Prabel wrote:
>
>
> Hi Orie, thanks for your feedback.
>
> I think the point about the specific use cases is not specific to hybrid 
> composite signatures, but could also be raised for pure PQ signatures, which 
> didn’t prevent the COSE ML-DSA draft to be adopted by the COSE WG.
>
> The LAMPS composite draft has already been adopted and is in WGLC. Given the 
> 2030 migration timelines announced by several security agencies and 
> organizations, I also believe waiting too long to standardize such mechanisms 
> could make it difficult for some systems to achieve compliance in time.
>
> Best,
>
> Lucas
>

--
Simo Sorce
Distinguished Engineer
RHEL Crypto Team
Red Hat, Inc

_______________________________________________
jose mailing list -- [email protected]<mailto:[email protected]>
To unsubscribe send an email to [email protected]<mailto:[email protected]>

_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to