MLS J. Alwen Internet-Draft AWS Intended status: Informational B. Hale Expires: 25 January 2025 Naval Postgraduate School M. Mularczyk AWS X. Tian Naval Postgraduate School 24 July 2024 Flexible Hybrid PQ MLS Combiner draft-hale-mls-combiner-00 Abstract This document describes a protocol for combining a traditional MLS session with a post-quantum (PQ) MLS session to achieve flexible and efficient hybrid post-quantum security. Specifically, we describe how to use the exporter secret of a PQ MLS session, i.e. an MLS session using a PQ ciphersuite, to seed PQ guarantees into an MLS session using a traditional ciphersuite. By supporting on-demand traditional-only key updates (a.k.a. PARTIAL updates) or hybrid-PQ key updates (a.k.a. FULL updates), we can reduce the bandwidth and computational overhead associated with meeting the requirement of frequent key rotations while still providing PQ security. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on 25 January 2025. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. Alwen, et al. Expires 25 January 2025 [Page 1] Internet-Draft HPQMLS July 2024 This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. About This Document . . . . . . . . . . . . . . . . . . . . . 3 3. Status of this Memo . . . . . . . . . . . . . . . . . . . . . 3 4. Copyright Notice . . . . . . . . . . . . . . . . . . . . . . 4 5. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 6. Notation . . . . . . . . . . . . . . . . . . . . . . . . . . 4 7. The Combiner Protocol Execution . . . . . . . . . . . . . . . 5 7.1. Commit Flow . . . . . . . . . . . . . . . . . . . . . . . 5 7.2. Adding a User . . . . . . . . . . . . . . . . . . . . . . 7 7.2.1. Welcome Message Validation . . . . . . . . . . . . . 7 7.2.2. External Joins . . . . . . . . . . . . . . . . . . . 8 7.2.3. Removing a Group Member . . . . . . . . . . . . . . . 8 8. Application Messages . . . . . . . . . . . . . . . . . . . . 8 9. Security Considerations . . . . . . . . . . . . . . . . . . . 8 9.1. Transport Security . . . . . . . . . . . . . . . . . . . 8 10. Extension Requirements to MLS . . . . . . . . . . . . . . . . 8 11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 12. References . . . . . . . . . . . . . . . . . . . . . . . . . 9 12.1. Normative References (i.e. RFCs) . . . . . . . . . . . 9 12.2. Informational References . . . . . . . . . . . . . . . . 9 Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 9 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9 1. Introduction A fully capable quantum adversary has the ability to break fundamental underlying cryptographic assumptions of traditional Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs). This has led to the development of post-quantum (PQ) cryptographically secure KEMs and DSAs by the cryptographic research community which have been formally adopted by the National Institute of Standards and Technology (NIST), including the Module Lattice KEM (ML-KEM) and Module Lattice DSA (ML-DSA) algorithms. While these provide PQ security, ML-KEM and ML-DSA have significantly worse overhead in terms of public key size, signature size, ciphertext size, and CPU time than their traditional counterparts. Moreover, research arms on side-channel attacks, etc., have motivated uses of Alwen, et al. Expires 25 January 2025 [Page 2] Internet-Draft HPQMLS July 2024 hybrid-PQ combiners that draw security from both the underlying PQ and underlying traditional components. A variety of hybrid security treatments have arisen across IETF working groups to bridge the gap between performance and security to encourage the adoption of PQ security in existing protocols, including the MLS protocol [RFC9420]. Within the MLS working group, there are several topic areas that make use of post-quantum security extensions: [Copied from draft-mahy-mls- xwing] 1. A straightforward MLS cipher suite that replaces a traditional KEM with a hybrid post-quantum/traditional KEM. Such a cipher suite could be implemented as a drop-in replacement in many MLS libraries without changes to any other part of the MLS stack. The aim is for implementations to have a single KEM which would be performant and work for the vast majority of implementations. It addresses the harvest-now / decrypt-later threat model using the simplest, and most practicable solution available. 1. Versions of existing cipher suites that use post-quantum signatures; and specific guidelines on the construction, use, and validation of hybrid signatures. 2. One or more mechanisms which reduce the bandwidth or storage requirements, or improve performance when using post-quantum algorithms (for example by updating post-quantum keys less frequently than traditional keys, or by sharing portions of post- quantum keys across a large number of clients or groups.) This document addresses the third topic of theses work items. 2. About This Document This note is to be removed before publishing as an RFC. Status information for this document may be found at _[Todo]_. Discussion of this document takes place on the MLS Working Group mailing list (mailto:mls@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/mls/. Subscribe at https://www.ietf.org/mailman/listinfo/mls/. Source for this draft and an issue tracker can be found at https://github.com/PairedMLS/draft-pairedMLS. 3. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Alwen, et al. Expires 25 January 2025 [Page 3] Internet-Draft HPQMLS July 2024 Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." 4. Copyright Notice Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/ license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License. 5. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, [RFC2119], and [RFC8174] when, and only when, they appear in all capitals, as shown here. The terms MLS client, MLS member, MLS group, Leaf Node, GroupContext, KeyPackage, Signature Key, Handshake Message, Private Message, Public Message, and RequiredCapabilities have the same meanings as in the [MLS protocol] https://www.rfc-editor.org/rfc/rfc9420.html (https://www.rfc-editor.org/rfc/rfc9420.html). 6. Notation *Traditional MLS Session:* An MLS session that uses a Diffie-Hellman (DH) based KEM as described in RFC9180. *Key Derivation Function (KDF):* A Hashed Message Authentication Code (HMAC)-based expand-and-extract key derivation function (HKDF) as described in RFC5869. Alwen, et al. Expires 25 January 2025 [Page 4] Internet-Draft HPQMLS July 2024 *Key Encapsulation Mechanism (KEM):* A key transport protocol that allows two parties to obtain a shared secret based on the receiver's public key. *Post Quantum (PQ) MLS Session:* An MLS session that uses a PQ-KEM construction, such as described by FIPS 203 from NIST. 7. The Combiner Protocol Execution The combiner protocol runs two MLS sessions in parallel, synchronizing their group memberships. The two sessions are combined by exporting a secret from the post quantum session and importing it as a Pre-Shared Key (PSK) in the traditional session. This combination process is mandatory for commits to add and remove proposals, in order to maintain synchronization between the sessions. However, it is optional for any other commits (e.g. to allow for cheap traditional PCS key rotations). Due to the higher computational costs and output sizes of PQ KEM (and signature) operations, it may be desirable to issue PQ combined commits less frequently than the traditional-only commits. The combiner protocol design treats both sessions as black-box interfaces so we only highlight operations requiring synchronizations in this document. 7.1. Commit Flow Commits to proposals MAY be _PARTIAL_ or _FULL_. For a PARTIAL commit, only the traditional session's epoch is updated following the propose-commit sequence from Section 12 of RFC9420. For a FULL commit, a commit is first applied to the PQ session and another commit is applied to the traditional session using a PSK derived from the exporter_secret of the PQ session. To ensure the correct PSK is used, the sender includes information about the PSK in a PreSharedKey proposal for in the traditional session's commit list of proposals (8.4, 8.5 RFC9420). Receivers process the PQ commit and the traditional commit (which also includes a PSK proposal) to derive the new epochs in both sessions. Alwen, et al. Expires 25 January 2025 [Page 5] Internet-Draft HPQMLS July 2024 Group A B Channel | | | | Commit'() | | | Commit(PreSharedKeyID) | | |----------------------------------------------------->| | | | | | Commit'() | | | Commit(PreSharedKeyID) | |<-----------------------------------------------------+ | |<---------------------------+ Fig 1a. FULL Commit to an empty proposal list. Messages with ' are sent in the the PQ session. PreSharedKeyID identifies a PSK exported from the PQ session and is included in the commit in the classical session. Group A B Channel | | | | | Upd'(B) | | | Upd(B, f) | | |------------------------------->| | | | | | Upd'(B) | | | Upd(B, f) | |<-------------------------------------------------------------+ | |<-------------------------------+ | | | | Commit'(Upd') | | | Commit(Upd, PreSharedKeyID) | | |------------------------------------------------------------->| | | | | | Commit'(Upd') | | | Commit(Upd, PreSharedKeyID) | |<-------------------------------------------------------------+ | |<-------------------------------+ Fig 1b. FULL Commit to an Update proposal from Client B. Messages with ' are sent in the the PQ session. *Remark*: Fig 1b shows Client A accepting the update proposals from Client B as a FULL commit. The flag f in the classical update proposal Upd(B, f) indicates B's intention for a FULL commit to whomever commits to its proposal. Alwen, et al. Expires 25 January 2025 [Page 6] Internet-Draft HPQMLS July 2024 7.2. Adding a User User leaf nodes are first added to the PQ session following the sequence described in Section 3 of RFC9420 except using PQ algorithms where HPKE algorithms exist. For example, a PQ KeyPackage one containing a PQ public key signed using a PQ DSA, must first be published to the Delivery Service (DS). Then the associated Add Proposal, Commit, and Welcome messages will be sent and processed in the PQ session according to Section 12 of RFC9420. The same sequence is repeated in the standard session except following the FULL Commit combining sequence where a PreSharedKeyID proposal is additionally committed. The joiner MUST issue a FULL commit as soon as possible to acheive PCS. [*XT*: Pick up edits here] Key Package Group A B Directory Channel | | | | | | KeyPackageB' | | | | KeyPackageB | | |<--------------------------------------------------------+ | | | | | | Commit'(Add'(KeyPackageB')) | | | | Commit(Add(KeyPackageB), PreSharedKeyID) | | | +---------------------------------------------------------------------------------------------------->| | | | | | Welcome' | | | | Welcome(PreSharedKeyID) | | | +----------------------------------------->| | | | | | | | | | Commit'(Add'(KeyPackageB')) | | | | Commit(Add(KeyPackageB), PreSharedKeyID) | |<----------------------------------------------------------------------------------------------------+ Figure 2: Client A adds client B to the group. Messages with ' come from the PQ session. Processing Welcome and Commit in the traditional sessio requires the PSK exported exported from the PQ session. 7.2.1. Welcome Message Validation Since a client must join two sessions, the Welcome messages it receives to each session must indicate that it is not sufficient to join only one or the other. Therefore, a HPQMLS Group Context Extension value indicating the GroupID and ciphersuites of the two sessions must be included in the Welcome message in order to validate joining the combined sessions. Alwen, et al. Expires 25 January 2025 [Page 7] Internet-Draft HPQMLS July 2024 7.2.2. External Joins External joins are used by members who join a group without being explicitly added (via a add-commit sequence) by another existing member. The external user MUST join both the PQ session and the traditional session. As stated previously, the GroupInfo used to create the external commit MUST contain the HPQMLS Group Context Extension value. After joining, the new member MUST issue a FULL update commit as described in Fig 1b. 7.2.3. Removing a Group Member User removals MUST be done in both PQ and traditional sessions followed by a full update as as described in Fig 1b. 8. Application Messages The HPQMLS combiner serves only to provide hybrid PQ security to a classical MLS session. Application messages are therefore only sent using the encryption_secret provided by the key schedule of the classical session according to Section 15 of RFC9420. 9. Security Considerations *[TODO:]* Remark on PQ KEM vs PQ Signatures and PQ Conf/Auth guarantees we get. *[TODO:]* PQ Session with only PQ KEM (Conf) not PQ Sigs (Auth) - we need to flag this as a Hybrid Conf Combiner or Hybrid Conf+Auth combiner *[TODO:]* Tighter windows for post compromise and FS windows. *[TODO:]* book-keeping operations (for fork resiliency?). *[TODO:]* Information leakage with the gid value being added to welcome messages *[TODO:]* Consider adding a statement to say how this combiner generalizes combining of two (or more?) arbitrary MLS sessions. *[TODO:]* Epoch Agreement (Fork Resiliency) 9.1. Transport Security Recommendations for preventing denial of service (DoS) attacks, or restricting transmitted messages are inherited from MLS. Furthermore, message integrity and confidentiality is, as for MLS, protected. 10. Extension Requirements to MLS Group Context Extension for HPQMLS SHALL be in the following format: Alwen, et al. Expires 25 January 2025 [Page 8] Internet-Draft HPQMLS July 2024 struct { ProtocolVersion version = mls10; CipherSuite cipher_suite; opaque group_id; uint64 epoch; opaque tree_hash; opaque confirmed_transcript_hash; Extension extensions; } GroupContext; Extension hpqmls{ opaque trad_session_group_id; opaque PQ_session_group_id; CipherSuite trad_cipher_suite; CipherSuite pq_cipher_suite; uint64 trad_epoch; uint64 pq_epoch; } 11. IANA Considerations *[TODO]* Determine an extension code to use 12. References 12.1. Normative References (i.e. RFCs) [1] https://www.rfc-editor.org/info/rfc9420 (https://www.rfc- editor.org/info/rfc9420) "MLS RFC" [2] https://www.rfc- editor.org/info/rfc5246 (https://www.rfc-editor.org/info/rfc5246) "TLS RFC" 12.2. Informational References Acknowledgments ## Contributors ## Authors Authors' Addresses Joël Alwen AWS Email: alwenjo@amazon.com Britta Hale Naval Postgraduate School Email: britta.hale@nps.edu Alwen, et al. Expires 25 January 2025 [Page 9] Internet-Draft HPQMLS July 2024 Marta Mularczyk AWS Email: mulmarta@amazon.ch Xisen Tian Naval Postgraduate School Email: xisen.tian1@nps.edu Alwen, et al. Expires 25 January 2025 [Page 10]