<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-kwiatkowski-tls-ecdhe-mlkem-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="ECDHE-MLKEM">Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-kwiatkowski-tls-ecdhe-mlkem-00"/>
    <author initials="K." surname="Kwiatkowski" fullname="Kris Kwiatkowski">
      <organization>PQShield</organization>
      <address>
        <email>kris@amongbytes.com</email>
      </address>
    </author>
    <author initials="P." surname="Kampanakis" fullname="Panos Kampanakis">
      <organization>AWS</organization>
      <address>
        <email>kpanos@amazon.com</email>
      </address>
    </author>
    <date year="2024" month="August" day="15"/>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>ML-KEM</keyword>
    <keyword>post-quantum</keyword>
    <abstract>
      <?line 47?>

<t>This draft defines a hybrid key agreement for TLS 1.3 that combines
a post-quantum KEM with elliptic curve Diffie-Hellman (ECDHE).</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://post-quantum-cryptography.github.io/draft-kwiatkowski-tls-ecdhe-mlkem/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-kwiatkowski-tls-ecdhe-mlkem/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/post-quantum-cryptography/draft-kwiatkowski-tls-ecdhe-mlkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>ML-KEM is a key encapsulation method (KEM) that is designed to withstand cryptanalytic attacks from quantum computers.</t>
        <t>Experimentation and early deployments are crucial steps in transitioning to post-quantum cryptography. This document specifies a hybrid post-quantum key agreement for use in the TLS 1.3 protocol to promote interoperability of these deployments.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="negotiated-groups">
      <name>Negotiated Groups</name>
      <t>This document introduces a new supported group for hybrid post-quantum key
agreements in TLS 1.3. The hybrid key agreement is detailed in the <xref target="hybrid"/> draft,
which combines the ML-KEM as defined in <xref target="FIPS-203"/>, with the ECDHE
scheme using elliptic curves from ANSI X9.62 <xref target="ECDSA"/> and NIST SP 800-186
<xref target="DSS"/>.</t>
      <t>The new group enables the derivation of TLS session keys using FIPS-approved schemes. NIST's
special publication 800-56Cr2 <xref target="SP56C"/> approves the usage of HKDF
<xref target="HKDF"/> with two distinct shared secrets, with the condition that the first one is computed by
a FIPS-approved key-establishment scheme. This draft specifies a new supported group where both
shared secrets are calculated by FIPS-approved mechanisms. The first one involves ECDHE with
a FIPS-approved curve secp256r1 (NIST P-256) specified by NIST SP 800-56Ar3
<xref target="SP56A"/> and NIST SP 800-186 <xref target="DSS"/>.
The second shared secret is obtained from the FIPS-approved ML-KEM-768 as defined in
<xref target="FIPS-203"/>.</t>
      <section anchor="construction">
        <name>Construction</name>
        <t>The name of the new supported hybrid post-quantum group is SecP256r1MLKEM768.</t>
        <t>When this group is negotiated, the client's share is a fixed-size concatenation of
the ECDHE share and ML-KEM's public key. The ECDHE share is the serialized value of
the uncompressed ECDH point representation as defined in Section 4.2.8.2 of <xref target="RFC8446"/>.
The ML-KEM's ephemeral share is the public key of the key generation step (see
<xref target="FIPS-203"/>, section 7.1) represented as an octet string. The size
of client share is 1249 bytes (65 bytes of ECDHE part and 1184 of ML-KEM part).</t>
        <t>The server's share is a fixed-size concatenation of ECDHE share and ML-KEM's ciphertext
returned from encapsulation (see <xref target="FIPS-203"/>, section 7.2).
The server ECDHE share is the serialized value of the uncompressed ECDH point representation
as defined in Section 4.2.8.2 of <xref target="RFC8446"/>. The server share is the ML-KEM's ciphertext
returned from the Encapsulate step (see <xref target="FIPS-203"/>, section 7.2)
represented as an octet string. The size of server's share is 1153 bytes (65 bytes of ECDHE
part and 1088 of ML-KEM part).</t>
        <t>Finally, the shared secret is a concatenation of the ECDHE and the ML-KEM
shared secrets. The ECDHE shared secret is the x-coordinate of the ECDH
shared secret elliptic curve point represented as an octet string as
defined in Section 7.4.2 of <xref target="RFC8446"/>. The ML-KEM shared secret is the
value returned from either encapsulation (on the server side) or decapsulation
(on the client side) represented as an octet string. The size of a shared
secret is 64 bytes (32 bytes of ECDHE part and 32 of ML-KEM part).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The same security considerations as those described in <xref target="hybrid"/> apply to the approach used by this document.
Implementers are encouraged to use implementations resistant to side-channel attacks, especially those that can be applied by remote attackers.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests/registers a new entry to the TLS Supported Groups
 registry, according to the procedures in <xref section="6" sectionFormat="of" target="tlsiana"/>. These identifiers are to be used with
 the final, ratified by NIST, version of ML-KEM which is specified in <xref target="FIPS-203"/>.</t>
      <dl>
        <dt>Value:</dt>
        <dd>
          <t>25499 (0x639B)</t>
        </dd>
        <dt>Description:</dt>
        <dd>
          <t>SecP256r1MLKEM768</t>
        </dd>
        <dt>DTLS-OK:</dt>
        <dd>
          <t>Y</t>
        </dd>
        <dt>Recommended:</dt>
        <dd>
          <t>N</t>
        </dd>
        <dt>Reference:</dt>
        <dd>
          <t>This document</t>
        </dd>
        <dt>Comment:</dt>
        <dd>
          <t>Combining secp256r1 ECDH with the ML-KEM-768</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="hybrid">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="5" month="April" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
        </reference>
        <reference anchor="tlsiana">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="30" month="April" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/>
        </reference>
        <reference anchor="HKDF">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <date month="May" year="2010"/>
          </front>
          <seriesInfo name="DOI" value="10.17487/rfc5869"/>
          <refcontent>RFC Editor</refcontent>
        </reference>
        <reference anchor="ECDSA">
          <front>
            <title>Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author>
              <organization>American National Standards Institute</organization>
            </author>
            <date year="2005" month="November"/>
          </front>
          <seriesInfo name="ANSI" value="ANS X9.62-2005"/>
        </reference>
        <reference anchor="FIPS-203">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="DSS">
          <front>
            <title>Recommendations for Discrete Logarithm-based Cryptography:: Elliptic Curve Domain Parameters</title>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Dustin Moody" initials="D." surname="Moody">
              <organization/>
            </author>
            <author fullname="Andrew Regenscheid" initials="A." surname="Regenscheid">
              <organization/>
            </author>
            <author fullname="Angela Robinson" initials="A." surname="Robinson">
              <organization/>
            </author>
            <author fullname="Karen Randall" initials="K." surname="Randall">
              <organization/>
            </author>
            <date month="February" year="2023"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-186"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="SP56C">
          <front>
            <title>Recommendation for Key-Derivation Methods in Key-Establishment Schemes</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="August" year="2020"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56cr2"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="SP56A">
          <front>
            <title>Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Lily Chen" initials="L." surname="Chen">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <author fullname="Apostol Vassilev" initials="A." surname="Vassilev">
              <organization/>
            </author>
            <author fullname="Richard Davis" initials="R." surname="Davis">
              <organization/>
            </author>
            <date month="April" year="2018"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-56ar3"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
    </references>
    <?line 157?>

<section anchor="change-log">
      <name>Change log</name>
      <ul spacing="normal">
        <li>
          <t>draft-kwiatkowski-tls-ecdhe-mlkem-00:
          </t>
          <ul spacing="normal">
            <li>Change Kyber name to ML-KEM</li>
            <li>Swap reference to I-D.cfrg-schwabe-kyber with FIPS-203</li>
            <li>Change codepoint. New value is equal to old value + 1.</li>
          </ul>
        </li>
        <li>draft-kwiatkowski-tls-ecdhe-kyber-01: Fix size of key shares generated by the client and the server</li>
        <li>draft-kwiatkowski-tls-ecdhe-kyber-00: updates following IANA review</li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
