<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.36 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mahy-mls-x25519kyber768draft00-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="X25519Kyber768Draft00 ciphersuite for MLS">Messaging Layer Security Ciphersuite using X25519Kyber768Draft00 Key Exchange Mechanism</title>
    <seriesInfo name="Internet-Draft" value="draft-mahy-mls-x25519kyber768draft00-00"/>
    <author initials="R." surname="Mahy" fullname="Rohan Mahy">
      <organization>Wire</organization>
      <address>
        <email>rohan.mahy@wire.com</email>
      </address>
    </author>
    <author initials="M." surname="Amiot" fullname="Mathieu Amiot">
      <organization>Wire</organization>
      <address>
        <email>mathieu.amiot@wire.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>sec</area>
    <workgroup>MLS</workgroup>
    <keyword>Kyber</keyword>
    <keyword>post-quantum</keyword>
    <keyword>post quantum KEM</keyword>
    <keyword>KEM</keyword>
    <keyword>PQ/T</keyword>
    <keyword>hybrid</keyword>
    <keyword>hybrid KEM</keyword>
    <keyword>Key Exchange Mechanism</keyword>
    <abstract>
      <?line 45?>

<t>This document registers a new Messaging Layer Security (MLS) ciphersuite using
the hybrid post-quantum resistant / traditional (PQ/T) Key Exchange Mechanism
X25519Kyber768Draft00.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-mahy-mls-x25519kyber768draft00/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        MLS Working Group mailing list (<eref target="mailto:mls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/mls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/mls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rohan-wire/mls-x25519kyber768draft00/"/>.</t>
    </note>
  </front>
  <middle>
    <?line 51?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This
document reserves a Messaging Layer Security (MLS) <xref target="I-D.ietf-mls-protocol"/>
ciphersuite value based on the MLS default ciphersuite, but replacing the KEM
with the hybrid post-quantum / traditional Key Exchange Mechanism
X25519Kyber768Draft00 <xref target="I-D.draft-westerbaan-cfrg-hpke-xyber768d00"/> which was
assigned the Hybrid Public Key Encryption (HPKE) Key Exchange Mechanism (KEM)
Identifier value <tt>0x0030</tt>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This ciphersuite uses a hybrid post-quantum/traditional KEM and a traditional
signature algorithm. As such, it is designed to provide confidentiality against
quantum and classical attacks, but provides authenticity against classical
attacks only. This is actually very useful, because an attacker could store
MLS-encrypted traffic that uses any classical KEM today. If years or decades in
the future a quantum attack on classical KEMs becomes feasible, the traffic sent
today (some of which could still be sensitive in the future) will then be readable.
By contrast, an attack on a signature algorithm in MLS would require an active
attack which can extract the private key during the signature key's lifetime.</t>
      <t>The security properties of <xref target="I-D.draft-westerbaan-cfrg-hpke-xyber768d00"/> apply.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers a new MLS Ciphersuite value.</t>
      <artwork><![CDATA[
Value:     0x0030 (please)
Name:      MLS_128_X25519Kyber768Draft00_AES128GCM_SHA256_Ed25519
Required:  N
Reference: This document
]]></artwork>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="I-D.ietf-mls-protocol">
        <front>
          <title>The Messaging Layer Security (MLS) Protocol</title>
          <author fullname="Richard Barnes" initials="R." surname="Barnes">
            <organization>Cisco</organization>
          </author>
          <author fullname="Benjamin Beurdouche" initials="B." surname="Beurdouche">
            <organization>Inria &amp; Mozilla</organization>
          </author>
          <author fullname="Raphael Robert" initials="R." surname="Robert">
            <organization>Phoenix R&amp;D</organization>
          </author>
          <author fullname="Jon Millican" initials="J." surname="Millican">
            <organization>Meta Platforms</organization>
          </author>
          <author fullname="Emad Omara" initials="E." surname="Omara">
            <organization>Google</organization>
          </author>
          <author fullname="Katriel Cohn-Gordon" initials="K." surname="Cohn-Gordon">
            <organization>University of Oxford</organization>
          </author>
          <date day="27" month="March" year="2023"/>
          <abstract>
            <t>   Messaging applications are increasingly making use of end-to-end
   security mechanisms to ensure that messages are only accessible to
   the communicating endpoints, and not to any servers involved in
   delivering messages.  Establishing keys to provide such protections
   is challenging for group chat settings, in which more than two
   clients need to agree on a key but may not be online at the same
   time.  In this document, we specify a key establishment protocol that
   provides efficient asynchronous group key establishment with forward
   secrecy and post-compromise security for groups in size ranging from
   two to thousands.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-mls-protocol-20"/>
      </reference>
      <reference anchor="I-D.draft-westerbaan-cfrg-hpke-xyber768d00">
        <front>
          <title>X25519Kyber768Draft00 hybrid post-quantum KEM for HPKE</title>
          <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
            <organization>Cloudflare</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization>Cloudflare</organization>
          </author>
          <date day="4" month="May" year="2023"/>
          <abstract>
            <t>   This memo defines X25519Kyber768Draft00, a hybrid post-quantum KEM,
   for HPKE (RFC9180).  This KEM does not support the authenticated
   modes of HPKE.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-westerbaan-cfrg-hpke-xyber768d00-02"/>
      </reference>
    </references>
    <?line 90?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thanks to Joël Alwen, Marta Mularczyk, and Britta Hale.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAOeKrGQAA5VW4W7bNhD+z6e4uT+WAJbtpmjXChhQt3UbL3XRJcE2YBhS
SqIsIpSokpQdtUhfaI+xF9t3kl07g7OtgRFT1PHuvu++OzqKIhF0MCqmhfJe
LnW1pLeyVY4uVNo4HVp6qetCOd/ooKjxbPDbyePHD5+dtYlyPzx5+srJPEwm
dKZamt2khayWCt54oX0pZJI4tYrvOZTuOc+to8XbC5HZtJIlUsrYKCpl0Ual
8dFN5+F64yHrPUSTidC1iym4xoeTyeTZ5ET4Jim199pWoa3haD67fE30gKTx
NqaBrjJVK/yrwmBIg/n0Bb4QfDA/v3w9kE7JmKQLYm3d9dLZpo67vPoXXqUi
lUEtrWtj0lVuxbVqYZrFgiLqAPKitj5EHxtZhabcPtPmmc5mi864/3r/8/iS
v4s2cTrbrb6aHWZW+CCr7EoaWwFjq7yodUy/B5sOyVsXnMo9Vm3Jiz+EWKmq
UUiS9jAR9Qz9Cqhc2jf8Crul1CYmsP5cq5CPrFtiU7q0iKkIofbxeMwmvKNX
arQ1GvPGOHF27dUYp8ccTYeiSWJyFnlHa+26N4erORYPiAzY9WEXqHcwSm05
/l8++vNCyCYU1nVVQZ18TOcjWkBMyImoV9g5+9ttAgGo/SQDlANOEKbbVj0b
XfARy/E5Z8AJ7XwvRjQttQ17zhcyFFo1e/v/7r/s7UeS7XchRGUdXoHmWAjW
2+4piiKSiQ9OpsB7WWhPaJ6mhLDJqaX2Ab1Fkiq1vr+/j6CD4zuN2HW5CIXa
6nBfy3DsNSsv0BhNJzPNaKShI5bx8X1iPdj+ox5CqbPMKIHaz6vgbNak7LIH
JPYAeeVWivH8B5bPn7+bR686UXaDo3YWTWHN7a3Yh7mSplGUSK8yshUxXhyn
TOWyMWGfkSElDSdQG5lyVDbl3lxDmXQfT3fZ+RZatgD6+bdWXMZEQvhp7pZR
UV+r6Gar+cnk9pbWhU4LWksvJKbesgIgzuq0z+p9kxid9hlUqWtrTomOTt+f
ze4rFx0B3rGY84jUuQbFPVkfJjeTyaPJhxEXa3dD2MrrTLlO134jxLuC6sp2
gKXxHY5mC8JEg+XermBAMjROYXxj6ILyEr3myTdpMSQdiFWvtrAtodorZEOp
rXLdAZCGs5RLiU4NYlsfjpQaJixFbBmCTK99X+mNC+SMEcIe0j0Hu0Nicwjq
Me2IOtj4oBkbaUxLK+Vaxp43Bn5VKrFG2E0skJraxmTkg8UggPQi1ZeHcaD0
OYoWChk29FXtXrpMVbCZRNh5jtkv0ee4wTIE4bx11bVv3vS8fb13+sis9juu
PGdnSxzMlfQ6MVA8n99m4cGB6MLRkYcd2XyjuS0CbQx8sKHXPJyQAe0yOKY1
GzCXbIV7NJMIMhIvWi4Twvgw3DHD+Uk6UHf2yi267qI69bHRrmc05aCbemxT
w7666WZjl0rt9Ao3A+G2pgzC3fTxLgxefO/J6FwFXSI56JgRbUQOTdTKBQ2S
gP5bO1TWNSTSjbjpu+nhjrl/dAPyy38OLjj78uWL+IXXMd8i1PcmHdUGRVTH
4l13C3V/8HD18OTp1cFxczWdXeDlm5eLq4vT6cnjJ1ezrLMT5z3DGby8w0Ou
HBQKn3fS7dIQ/SRPQD+DnKbXlV0blS3ZwovPcdWUCKqyHwc5foWpwS2DlhWa
By37k/3rT0NTs1bVENemCxjxDf+4+NReD7tGfYEaYPdUsmr+BtWq14K2CgAA

-->

</rfc>
