<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>


<rfc ipr="trust200902" docName="draft-josefsson-ssh-frodokem-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="FrodoKEM for SSH">Secure Shell Key Exchange Method Using Chempat Hybrid of FrodoKEM-976 and X25519 with SHA-512: frodokem976x25519-sha512</title>

    <author fullname="Simon Josefsson">
      <organization></organization>
      <address>
        <email>simon@josefsson.org</email>
      </address>
    </author>

    <date year="2025" month="March" day="18"/>

    <area>int</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This document specify a hybrid key exchange method in the Secure Shell (SSH) protocol based on FrodoKEM (FrodoKEM-976) and X25519 with SHA-512 using Chempat as the combiner.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-josefsson-ssh-frodokem/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/jas/ietf-ssh-frodokem"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Secure Shell (SSH) <xref target="RFC4251"/> is a secure remote login protocol.
The key exchange protocol described in <xref target="RFC4253"/> supports an extensible set of methods.
<xref target="RFC5656"/> defines how elliptic curves are integrated into this extensible SSH framework, and <xref target="RFC8731"/> specify "curve25519-sha256" to support the pre-quantum elliptic-curve Diffie-Hellman X25519 function <xref target="RFC7748"/>.
In <xref target="I-D.josefsson-ntruprime-ssh"/> it is described how the post-quantum lattice-based Streamlined NTRU Prime is combined with X25519 for SSH, and we base our protocol and document on it but replace sntrup761 with FrodoKEM-976 and use Chempat <xref target="I-D.josefsson-chempat"/> for the combiner.</t>

<t>FrodoKEM <xref target="I-D.longa-cfrg-frodokem"/> provides a Key Encapsulation Method (KEM) based on learning with errors problem, designed to be safe even against quantum computers.
The variant "FrodoKEM-976" offers a balance between security, performance and output sizes.</t>

<t>To hedge against attacks on either of FrodoKEM-976 or X25519 a hybrid construction Chempat is used, with the intention that the hybrid would be secure if either of the involved algorithms are flawed.</t>

<t>This document specify how to implement key exchange based on a Chempat hybrid between FrodoKEM-976 and X25519 <xref target="RFC6234"/> in SSH.</t>

<t>The SHA-512 in the name of this method refers to the HASH used in Section <xref target="RFC4253" section="7.2" sectionFormat="bare">Output from Key Exchange</xref> of <xref target="RFC4253"/>, not that of the hybrid KEM combiner.</t>

</section>
<section anchor="conventions-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="frodokem976x25519-sha512"><name>Key Exchange Method: frodokem976x25519-sha512</name>

<t>The key-agreement is done by the X25519 Diffie-Hellman protocol as described in Section <xref target="RFC8731" section="3" sectionFormat="bare">Key Exchange Methods</xref> of <xref target="RFC8731"/>, and the FrodoKEM-976 key encapsulation method described in <xref target="I-D.longa-cfrg-frodokem"/>.</t>

<t>The key exchange procedure reuse the Elliptic Curve Diffie-Hellman (ECDH) key exchange defined in Sections <xref target="RFC5656" section="4" sectionFormat="bare">ECDH Key Exchange</xref> and <xref target="RFC5656" section="7.1" sectionFormat="bare">ECDH Message Numbers</xref> of <xref target="RFC5656"/>.
The protocol flow and the <spanx style="verb">SSH_MSG_KEX_ECDH_INIT</spanx> and <spanx style="verb">SSH_MSG_KEX_ECDH_REPLY</spanx> messages are identical, except that we use different ephemeral public values Q_C and Q_S and shared secret K as described below.</t>

<t>The <spanx style="verb">SSH_MSG_KEX_ECDH_INIT</spanx> value <spanx style="verb">Q_C</spanx> that holds the client's ephemeral public key <bcp14>MUST</bcp14> be constructed by concatenating the 15.632 byte public key output from the key generator of FrodoKEM-976 with the 32 byte K_A = X25519(a, 9) as described in <xref target="I-D.longa-cfrg-frodokem"/> and <xref target="RFC8731"/>.
The Q_C value is thus 15.664 bytes.</t>

<t>The <spanx style="verb">SSH_MSG_KEX_ECDH_REPLY</spanx> value <spanx style="verb">Q_S</spanx> that holds the server's ephemeral public key <bcp14>MUST</bcp14> be constructed by concatenating the 15.792 byte ciphertext output from the key encapsulation mechanism of FrodoKEM-976 with the 32 byte K_B = X25519(b, 9) as described in <xref target="I-D.longa-cfrg-frodokem"/> and <xref target="RFC8731"/>.
The <spanx style="verb">Q_S</spanx> value is thus 15.824 bytes.</t>

<t>Clients and servers <bcp14>MUST</bcp14> abort if the length of the received public keys <spanx style="verb">Q_C</spanx> or <spanx style="verb">Q_S</spanx> are not the expected lengths.
An abort for these purposes is defined as a disconnect (<spanx style="verb">SSH_MSG_DISCONNECT</spanx>) of the session and <bcp14>SHOULD</bcp14> use the <spanx style="verb">SSH_DISCONNECT_KEY_EXCHANGE_FAILED</spanx> reason for the message, see Section <xref target="RFC4253" section="11.1" sectionFormat="bare">Disconnection Message</xref> of <xref target="RFC4253"/>.
No further validation is required beyond what is described in <xref target="RFC7748"/>, <xref target="RFC8731"/> and <xref target="I-D.longa-cfrg-frodokem"/>.</t>

<t>The <spanx style="verb">SSH_MSG_KEX_ECDH_REPLY</spanx> signature value is computed as described in <xref target="RFC5656"/> with the following changes.
Instead of encoding the shared secret <spanx style="verb">K</spanx> as 'mpint', it <bcp14>MUST</bcp14> be encoded as 'string'.
The shared secret K value <bcp14>MUST</bcp14> be the 32-byte output octet string computed by Chempat-X25519-FrodoKEM-976 <xref target="I-D.josefsson-chempat"/>.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The protocol and document is based on <xref target="I-D.josefsson-ntruprime-ssh"/> and <xref target="I-D.josefsson-ssh-mceliece"/>.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of <xref target="RFC4251"/>, <xref target="RFC5656"/>, <xref target="RFC7748"/>, <xref target="RFC8731"/>, <xref target="I-D.josefsson-chempat"/> and <xref target="I-D.longa-cfrg-frodokem"/> are inherited.</t>

<t>FrodoKEM is designed for IND-CCA2 security even against quantum computers.
Chempat is a conservatively designed way to combine a classical and post-quantum method.
However new cryptographic primitives should be introduced and trusted conservatively, and new research findings may be published at any time that may warrant implementation reconsiderations.</t>

<t>The increase in communication size and computational requirements may be a concern for limited computational devices, which would then not be able to take advantage of the improved security properties offered by this work.</t>

<t>As discussed in the security considerations of Curve25519-sha256 <xref target="RFC8731"/>, the X25519 shared secret <spanx style="verb">K</spanx> is used bignum-encoded in that document, and this raise a potential for a hash-processing time side-channel that could leak one bit of the secret due to different length of the bignum sign pad.
This document resolve that problem by using string-encoding instead of bignum-encoding.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to add a new "Method Name" of "frodokem976x25519-sha512" to the "Key Exchange Method Names" registry for Secure Shell (SSH) Protocol Parameters <xref target="IANA-KEX"/> with a "reference" field to this RFC and the "OK to implement" field of "<bcp14>MUST</bcp14>".</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC4251' target='https://www.rfc-editor.org/info/rfc4251'>
  <front>
    <title>The Secure Shell (SSH) Protocol Architecture</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4251'/>
  <seriesInfo name='DOI' value='10.17487/RFC4251'/>
</reference>

<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
  <front>
    <title>The Secure Shell (SSH) Transport Layer Protocol</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
      <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
      <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
      <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4253'/>
  <seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>

<reference anchor='RFC5656' target='https://www.rfc-editor.org/info/rfc5656'>
  <front>
    <title>Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer</title>
    <author fullname='D. Stebila' initials='D.' surname='Stebila'/>
    <author fullname='J. Green' initials='J.' surname='Green'/>
    <date month='December' year='2009'/>
    <abstract>
      <t>This document describes algorithms based on Elliptic Curve Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5656'/>
  <seriesInfo name='DOI' value='10.17487/RFC5656'/>
</reference>

<reference anchor='RFC8731' target='https://www.rfc-editor.org/info/rfc8731'>
  <front>
    <title>Secure Shell (SSH) Key Exchange Method Using Curve25519 and Curve448</title>
    <author fullname='A. Adamantiadis' initials='A.' surname='Adamantiadis'/>
    <author fullname='S. Josefsson' initials='S.' surname='Josefsson'/>
    <author fullname='M. Baushke' initials='M.' surname='Baushke'/>
    <date month='February' year='2020'/>
    <abstract>
      <t>This document describes the specification for using Curve25519 and Curve448 key exchange methods in the Secure Shell (SSH) protocol.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8731'/>
  <seriesInfo name='DOI' value='10.17487/RFC8731'/>
</reference>

<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC6234' target='https://www.rfc-editor.org/info/rfc6234'>
  <front>
    <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
    <author fullname='D. Eastlake 3rd' initials='D.' surname='Eastlake 3rd'/>
    <author fullname='T. Hansen' initials='T.' surname='Hansen'/>
    <date month='May' year='2011'/>
    <abstract>
      <t>Federal Information Processing Standard, FIPS</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='6234'/>
  <seriesInfo name='DOI' value='10.17487/RFC6234'/>
</reference>

<reference anchor='RFC7748' target='https://www.rfc-editor.org/info/rfc7748'>
  <front>
    <title>Elliptic Curves for Security</title>
    <author fullname='A. Langley' initials='A.' surname='Langley'/>
    <author fullname='M. Hamburg' initials='M.' surname='Hamburg'/>
    <author fullname='S. Turner' initials='S.' surname='Turner'/>
    <date month='January' year='2016'/>
    <abstract>
      <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS). These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='7748'/>
  <seriesInfo name='DOI' value='10.17487/RFC7748'/>
</reference>


<reference anchor='I-D.longa-cfrg-frodokem' target='https://datatracker.ietf.org/doc/html/draft-longa-cfrg-frodokem-00'>
   <front>
      <title>FrodoKEM: key encapsulation from learning with errors</title>
      <author fullname='Patrick Longa' initials='P.' surname='Longa'>
         <organization>Microsoft</organization>
      </author>
      <author fullname='Joppe W. Bos' initials='J. W.' surname='Bos'>
         <organization>NXP Semiconductors</organization>
      </author>
      <author fullname='Stephan Ehlen' initials='S.' surname='Ehlen'>
         <organization>Federal Office for Information Security (BSI)</organization>
      </author>
      <author fullname='Douglas Stebila' initials='D.' surname='Stebila'>
         <organization>University of Waterloo</organization>
      </author>
      <date day='17' month='March' year='2025'/>
      <abstract>
	 <t>   This internet draft specifies FrodoKEM, an IND-CCA2 secure Key
   Encapsulation Mechanism (KEM).

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-longa-cfrg-frodokem/.

   Source for this draft and an issue tracker can be found at
   github.com/dstebila/frodokem-internet-draft.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-longa-cfrg-frodokem-00'/>
   
</reference>


<reference anchor='I-D.josefsson-chempat' target='https://datatracker.ietf.org/doc/html/draft-josefsson-chempat-03'>
   <front>
      <title>Chempat: Generic Instantiated PQ/T Hybrid Key Encapsulation Mechanisms</title>
      <author fullname='Simon Josefsson' initials='S.' surname='Josefsson'>
         </author>
      <date day='18' month='March' year='2025'/>
      <abstract>
	 <t>   This document specify Chempat as a generic family of instantiated
   Post-Quantum/Traditional (PQ/T) Hybrid Key Exchange Methods (KEMs).
   The goal is to provide a generic combiner construct that can be
   analysed separately for security assurance, and to offer concrete
   instantiated algorithms for integration into protocol and
   implementations.  Identified instances are provided based on some
   combinations of traditional Diffie-Hellman key agreement using curves
   P-256, P-384, X25519, X448, brainpoolP256, brainpoolP384 and
   brainpoolP512 combined with post quantum methods ML-KEM-768, ML-KEM-
   1024, Streamlined NTRU Prime sntrup761, Classic McEliece and
   FrodoKEM.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-josefsson-chempat-03'/>
   
</reference>


<reference anchor='I-D.josefsson-ssh-mceliece' target='https://datatracker.ietf.org/doc/html/draft-josefsson-ssh-mceliece-01'>
   <front>
      <title>Secure Shell Key Exchange Method Using Chempat Hybrid of Classic McEliece and X25519 with SHA-512: mceliece6688128x25519-sha512</title>
      <author fullname='Simon Josefsson' initials='S.' surname='Josefsson'>
         </author>
      <date day='18' month='March' year='2025'/>
      <abstract>
	 <t>   This document specify a hybrid key exchange method in the Secure
   Shell (SSH) protocol based on Classic McEliece (mceliece6688128) and
   X25519 with SHA-512 using Chempat as the combiner.

About This Document

   This note is to be removed before publishing as an RFC.

   Status information for this document may be found at
   https://datatracker.ietf.org/doc/draft-josefsson-ssh-mceliece/.

   Source for this draft and an issue tracker can be found at
   https://gitlab.com/jas/ietf-ssh-mceliece.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-josefsson-ssh-mceliece-01'/>
   
</reference>


<reference anchor='I-D.josefsson-ntruprime-ssh' target='https://datatracker.ietf.org/doc/html/draft-josefsson-ntruprime-ssh-03'>
   <front>
      <title>Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512</title>
      <author fullname='Markus Friedl' initials='M.' surname='Friedl'>
         <organization>OpenSSH</organization>
      </author>
      <author fullname='Jan Mojzis' initials='J.' surname='Mojzis'>
         <organization>TinySSH</organization>
      </author>
      <author fullname='Simon Josefsson' initials='S.' surname='Josefsson'>
         </author>
      <date day='17' month='August' year='2024'/>
      <abstract>
	 <t>   This document describe a widely deployed hybrid key exchange method
   in the Secure Shell (SSH) protocol that is based on Streamlined NTRU
   Prime sntrup761 and X25519 with SHA-512.

	 </t>
      </abstract>
   </front>
   <seriesInfo name='Internet-Draft' value='draft-josefsson-ntruprime-ssh-03'/>
   
</reference>


<reference anchor="IANA-KEX" target="https://www.iana.org/assignments/ssh-parameters/">
  <front>
    <title>Secure Shell (SSH) Protocol Parameters: Key Exchange Method Names</title>
    <author >
      <organization>IANA</organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

