<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-risks-of-mlkem-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>Risks of Standalone ML-KEM in TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-risks-of-mlkem-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden, Germany</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="May" day="15"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 43?>

<t>We attest that standalone ML-KEM in TLS 1.3 breaks the existing formal proofs of TLS in state-of-the-art symbolic security analysis tool, ProVerif.
We also attest that from a formal analysis perspective, this is a much bigger change than RFC8773bis, which indeed went for FATT review (cf. <xref target="TLS-FATT"/>).
We, therefore, kindly ask the chairs to initiate the FATT review of standalone ML-KEM in TLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/risks-of-mlkem/draft-usama-tls-risks-of-mlkem.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-risks-of-mlkem/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/risks-of-mlkem"/>.</t>
    </note>
  </front>
  <middle>
    <?line 50?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Readers are assumed to be familiar with <xref target="NistFips203"/>, <xref target="I-D.ietf-tls-rfc8446bis"/>, and <xref target="I-D.ietf-tls-mlkem"/>.</t>
      <t>We assert that the security considerations of <xref target="I-D.ietf-tls-mlkem"/> are insufficient.
We believe that symbolic and computational analysis of ML-KEM in the context of TLS is helpful here.
We request that if the author has done any formal analysis, it would be very helpful to present the current state of formal analysis in the next meeting for discussion.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>The draft aims to formally study the security of standalone ML-KEM in TLS 1.3 <xref target="I-D.ietf-tls-mlkem"/>.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<ul spacing="normal">
        <li>
          <t>Symbolic analysis: see <eref target="https://eprint.iacr.org/2019/1393.pdf">SoK</eref></t>
        </li>
        <li>
          <t>Computational analysis: see <eref target="https://eprint.iacr.org/2019/1393.pdf">SoK</eref></t>
        </li>
      </ul>
      <section anchor="sec-proof-break">
        <name>Where ProVerif Proofs Break</name>
        <t>While ML-KEM <xref target="I-D.ietf-tls-mlkem"/> looks like just a "trivial" addition, it makes changes as deep as the key schedule of TLS. It essentially replaces the <em>key exchange</em> by <em>key encapsulation</em>. While the former is symmetric, the latter is asymmetric.
This symmetry is in terms of exchange of roles, and that the order does not matter.
The proof in ProVerif is, therefore, utilizes this symmetry for the commutativity of the components g<sup>x</sup> and g<sup>y</sup>, where g<sup>x</sup> and g<sup>y</sup> represent the public keys of the endpoints.
In ProVerif syntax:
(see details <eref target="https://github.com/CCC-Attestation/formal-spec-id-crisis/blob/6c3d17a428198aa058f805d16fe6baef7894028f/TLS-a/fix/tls-lib-simple.pvl#L38-L41">here</eref>)</t>
        <artwork><![CDATA[
fun dh_ideal(element,bitstring):element.
equation forall x:bitstring, y:bitstring;
         dh_ideal(dh_ideal(G,x),y) =
         dh_ideal(dh_ideal(G,y),x).
]]></artwork>
        <t>Key encapsulation does not enjoy this commutativity property, or even an analogous symmetry argument. There is essentially only one endpoint (say client) which generates the key pair <tt>(dk,ek)</tt> where <tt>dk</tt> represents the secret decapsulation key and <tt>ek</tt> represents the public encapsulation key.
As opposed to both endpoints sending their public keys g<sup>x</sup> and g<sup>y</sup> in the key exchange, only one of the endpoints (client in above example) sends the public encapsulation key and peer sends a ciphertext. This asymmetry breaks the existing proofs of TLS 1.3 in ProVerif and requires a new proof.</t>
      </section>
      <section anchor="current-status-and-next-steps">
        <name>Current Status and Next Steps</name>
        <t><xref target="I-D.ietf-tls-mlkem"/> had an opposition of several (ca. 25 in our understanding) WG participants -- even more than the supporters (ca. 21 in our understanding) -- in the last WGLC. We see 2 possible options:</t>
        <ul spacing="normal">
          <li>
            <t>Continue tabletop discussions on subjective calculation of risks, costs, tradeoffs, etc., and keep burning WG energy.</t>
          </li>
          <li>
            <t>Do some technical analysis using formal methods (symbolic and computational) to get a confirmation on the security of ML-KEM in the context of TLS and offer a statement for security considerations, and move on to more critical works like hybrid authentication.</t>
          </li>
        </ul>
        <t>We believe the former cannot resolve the dispute. We believe the latter <em>may</em> help.</t>
        <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the preference of hybrids,
and potential issues regarding KEM binding in TLS.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        <section anchor="cost">
          <name>"Cost"</name>
          <t>"Cost" has been presented on the list as the motivation for ML-KEM but no reference has yet been presented.
We believe costs will depend on several factors -- including but not limited to implementation details and deployment scenario -- and it is quite subjective.</t>
          <t>There seems to be a need for a thorough study to understand the "cost."
We invite the WG participants to perform this analysis and share the results with the WG.</t>
        </section>
      </section>
      <section anchor="sec-sol-ml-kem">
        <name>ML-KEM: FATT Review</name>
        <t>We have formally requested the chairs to initiate the FATT process for <xref target="I-D.ietf-tls-mlkem"/>.
See <eref target="https://mailarchive.ietf.org/arch/msg/tls/rClgrWm2hnhESXHx56U8InbwQQs/">this</eref> and <eref target="https://mailarchive.ietf.org/arch/msg/tls/7lj6fYAweMBwNMxFerNl7xhY0pk/">this</eref>.</t>
        <section anchor="expected-learning">
          <name>Expected Learning</name>
          <t>We believe formal methods can provide additional value for security considerations of this draft in order to maintain the high cryptographic assurance of TLS.
Since we have no guarantee on whether ECDHE will break before ML-KEM, it seems appropriate to do thorough cryptographic analysis.
We believe the Harvest Now, Decrypt Later (HNDL) attack applies equally well to standalone ML-KEM.
Adversary can record all traffic and decrypt it when ML-KEM is broken (or probably it is already broken; who knows?)</t>
          <ul spacing="normal">
            <li>
              <t>As an example, it can help justify design choices, such as the preference for hybrids.
It can help identify ways in which ML-KEM can break.
It can also help identify all the assumptions under which the properties hold.</t>
            </li>
            <li>
              <t>As a relevant data point in the context of standardization, LAKE WG has done formal analysis for EDHOC-PSK with KEM (<eref target="https://mailarchive.ietf.org/arch/msg/lake/2XGOI9OCwylJUfSCasvvwM2FXmw/">ref</eref>).</t>
            </li>
            <li>
              <t><em>Computational</em> analysis (cf. <eref target="https://eprint.iacr.org/2019/1393.pdf">SoK</eref>)-- using tools such as CryptoVerif -- seems like a reasonable approach to ensure security of ML-KEM in TLS, such as binding.</t>
            </li>
          </ul>
        </section>
        <section anchor="formal-analysis-work-in-progress">
          <name>Formal Analysis (Work-in-progress)</name>
          <t>We have presented observation from our ongoing symbolic security analysis (cf. limitations in <xref target="sec-sec-cons"/>) using ProVerif on the mailing list.</t>
          <t>We argue that in general:</t>
          <ol spacing="normal" type="1"><li>
              <t>Migration from ECDHE to hybrid is security improvement.</t>
            </li>
            <li>
              <t>Migration from hybrid to standalone ML-KEM is security regression.</t>
            </li>
          </ol>
          <section anchor="hybrid-pqt">
            <name>Hybrid PQ/T</name>
            <t>More formally, the property hybrid PQ/T should provide is:</t>
            <artwork><![CDATA[
Hybrid PQ/T is secure unless both ECDHE and ML-KEM are broken.
]]></artwork>
            <t>Hybrid preserves ECDHE, and adds ML-KEM as an additional factor.
So as long as one of them is not broken, the system is secure.
In particular, even if ML-KEM is completely broken, the system retains the security level of ECDHE.</t>
          </section>
          <section anchor="standalone-pq">
            <name>Standalone PQ</name>
            <t>On the other hand, the formal property standalone PQ provides is:</t>
            <artwork><![CDATA[
Standalone PQ is secure unless ML-KEM is broken.
]]></artwork>
            <t>If ML-KEM is broken, the whole system is broken.</t>
          </section>
          <section anchor="comparison">
            <name>Comparison</name>
            <t>Leak out the ECDHE key from hybrid PQ/T and you get a standalone ML-KEM.
Clearly, hybrid is in general more secure, unless ECDHE is fully broken, in which case it still falls equivalent to standalone ML-KEM, or in the hypothetical scenario that there is an implementation bug in the ECDHE part which is triggered only in composition.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model.
The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios.
Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="NistFips203">
          <front>
            <title>Module-lattice-based key-encapsulation mechanism standard</title>
            <author>
              <organization/>
            </author>
            <date month="August" year="2024"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.usama-tls-fatt-extension">
          <front>
            <title>Extensions to TLS FATT Process</title>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <date day="2" month="May" year="2026"/>
            <abstract>
              <t>   This document applies only to non-trivial extensions of TLS, which
   require formal analysis.  It proposes the authors specify a threat
   model and informal security goals in the Security Considerations
   section, as well as motivation and a protocol diagram in the draft.
   We also briefly present a few pain points of the team doing the
   formal analysis which -- we believe -- require refining the process:

   *  Provide protection against FATT-bypass by other TLS-related WGs

   *  Contacting FATT

   *  ML-KEM

   *  Understanding the opposing goals

   *  Response within reasonable time frame

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-07"/>
        </reference>
      </references>
    </references>
    <?line 205?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The research work is funded by German Research Foundation ("Deutsche Forschungsgemeinschaft.")</t>
    </section>
    <section numbered="false" anchor="history">
      <name>History</name>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>On popular demand, moved from <xref target="I-D.usama-tls-fatt-extension"/> to an independent I-D</t>
        </li>
        <li>
          <t>Major change: added <xref target="sec-proof-break"/></t>
        </li>
        <li>
          <t>Some minor clarifications</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
