Internet DRAFT - draft-hale-pquip-hybrid-signature-spectrums
draft-hale-pquip-hybrid-signature-spectrums
Network Working Group N. Bindel
Internet-Draft SandboxAQ
Intended status: Informational B. Hale
Expires: 26 August 2024 Naval Postgraduate School
D. Connolly
SandboxAQ
F. Driscoll
UK National Cyber Security Centre
23 February 2024
Hybrid signature spectrums
draft-hale-pquip-hybrid-signature-spectrums-03
Abstract
This document describes classification of design goals and security
considerations for hybrid digital signature schemes, including proof
composability, non-separability of the component signatures given a
hybrid signature, backwards/forwards compatiblity, hybrid generality,
and simultaneous verification.
Discussion of this work is encouraged to happen on the IETF PQUIP
mailing list pqc@ietf.org or on the GitHub repository which contains
the draft: https://github.com/dconnolly/draft-hale-pquip-hybrid-
signature-spectrums
Discussion Venues
This note is to be removed before publishing as an RFC.
Discussion of this document takes place on the Post-Quantum Use In
Protocols Working Group mailing list (pqc@ietf.org), which is
archived at https://mailarchive.ietf.org/arch/browse/pqc/.
Source for this draft and an issue tracker can be found at
https://github.com/dconnolly/draft-connolly-pquip-hybrid-signature-
spectrums.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Bindel, et al. Expires 26 August 2024 [Page 1]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 26 August 2024.
Copyright Notice
Copyright (c) 2024 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Revision history . . . . . . . . . . . . . . . . . . . . 4
1.2. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
1.3. Motivation for use of hybrid signature schemes . . . . . 6
1.3.1. *Complexity* . . . . . . . . . . . . . . . . . . . . 6
1.3.2. *Time* . . . . . . . . . . . . . . . . . . . . . . . 7
1.4. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4.1. *Hybrid Authentication* . . . . . . . . . . . . . . . 8
1.4.2. *Proof Composability* . . . . . . . . . . . . . . . . 9
1.4.3. *Weak Non-Separability* . . . . . . . . . . . . . . . 9
1.4.4. *Strong Non-Separability* . . . . . . . . . . . . . . 10
1.4.5. *Backwards/Forwards Compatibility* . . . . . . . . . 10
1.4.6. *Simultaneous Verification* . . . . . . . . . . . . . 11
1.4.7. *Hybrid Generality* . . . . . . . . . . . . . . . . . 12
1.4.8. *High performance* . . . . . . . . . . . . . . . . . 12
1.4.9. *High space efficiency* . . . . . . . . . . . . . . . 12
1.4.10. *Minimal duplicate information* . . . . . . . . . . . 12
2. Non-separability spectrum . . . . . . . . . . . . . . . . . . 12
3. Artifacts . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1. Artifact locations . . . . . . . . . . . . . . . . . . . 15
3.2. Artifact Location Comparison Example . . . . . . . . . . 15
4. Need-For-Approval Spectrum . . . . . . . . . . . . . . . . . 19
5. EUF-CMA Challenges . . . . . . . . . . . . . . . . . . . . . 21
6. Security Considerations . . . . . . . . . . . . . . . . . . . 21
7. Discussion of Advantages/Disadvantages . . . . . . . . . . . 21
Bindel, et al. Expires 26 August 2024 [Page 2]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
7.1. Backwards compatibility vs. SNS. . . . . . . . . . . . . 21
7.2. Backwards compatibility vs. hybrid unforgeability. . . . 22
7.3. Simultaneous verification vs. low need for approval. . . 22
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 22
9. Informative References . . . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 24
1. Introduction
Initial focus on the transition to use of post-quantum algorithms in
protocols has largely been on confidentiality, given the potential
risk of store and decrypt attacks, where data encrypted today using
traditional algorithms could be decrypted in the future by an
attacker with a Cryptographically-Relevant Quantum Computer (CRQC).
While traditional authentication is only at risk once a CRQC exists,
it is important to consider the transition to post-quantum
authentication before this point. This is particularly relevant for
systems where algorithm turn-over is complex or takes a long time
(e.g., long-lived systems with hardware roots of trust), or where
future checks on past authenticity play a role (e.g., digital
signatures on legal documents).
One approach to design quantum-resistant protocols, particularly
during the transition period from traditional to post-quantum
algorithms, is incorporating hybrid signatures schemes, which combine
both traditional and post-quantum (or more generally next-generation)
algorithms in one cryptographic scheme. Hybridization has been
looked at for key encapsulation [HYBRIDKEM], and in an initial sense
for digital signatures [HYBRIDSIG]. Compared to key encapsulation,
hybridization of digital signatures, where the verification tag may
be expected to attest to both standard and post-quantum components,
is subtler to design and implement due to the potential separability
of the hybrid/dual signatures and the risk of downgrade/stripping
attacks. There are also a range of requirements and properties that
may be required from dual signatures, not all of which can be
achieved at once.
This document focuses on explaining advantages and disadvantages of
different hybrid signature scheme designs and different security
goals for them. It is intended as a resource for designers and
implementers of hybrid signature schemes to help them decide what
properties they do and do not require from their scheme. It
intentionally does not propose concrete hybrid signature combiners or
instantiations thereof.
Bindel, et al. Expires 26 August 2024 [Page 3]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.1. Revision history
*RFC Editor's Note:* Please remove this section prior to
publication of a final version of this document.
* 01: Significant fleshing out after feedback from IETF 118.
* 00: Initial version.
1.2. Terminology
We follow existing Internet drafts on hybrid terminology
[I-D.ietf-pquip-pqt-hybrid-terminology] and hybrid key encapsulation
mechanisms (KEM) [I-D.ietf-tls-hybrid-design] to enable settling on a
consistent language. We will make clear when this is not possible.
In particular, we follow the definition of 'post-quantum algorithm',
'traditional algorithms', and 'combiner'. Moreover, we use the
definition of 'certificate' to mean 'public-key certificate' as
defined in [RFC4949].
* Signature scheme: A signature scheme is defined via the following
three algorithms:
- KeyGen() -> (pk, sk): A probabilistic key generation algorithm,
which generates a public verifying key pk and a secret signing
key sk.
- Sign(sk, m) -> (sig): A probabilistic signature generation,
which takes as input a secret signing key sk and a message m,
and outputs a signature sig.
- Verify(pk, sig, m) -> b: A verification algorithm, which takes
as input a public verifying key pk, a signature sig and a
message m, and outputs a bit b indicating accept (b=1) or
reject (b=0) of the signature for message m.
* Hybrid signature scheme: Following
[I-D.ietf-pquip-pqt-hybrid-terminology], we define a hybrid
signature scheme to be "a multi-algorithm digital signature scheme
made up of two or more component digital signature algorithms
...". While it often makes sense for security purposes to require
that the security of the component schemes is based on the
hardness of different cryptographic assumptions, in other cases
hybrid schemes might be motivated, e.g., by interoperatbility of
variants on the same scheme and as such both component schemes are
based on the same hardness assumption (e.g., both post-quantum
assumptions or even both the same concrete assumption such as Ring
LWE). We allow this explicitly. This means in particular that in
Bindel, et al. Expires 26 August 2024 [Page 4]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
contrast to [I-D.ietf-pquip-pqt-hybrid-terminology], we will use
the more general term 'hybrid signature scheme' instead of
requiring one post-quantum and one traditional algorithm (i.e.,
PQ/T hybrid signature schemes) to allow also the combination of
several post-quantum algorithms. The term 'composite scheme' is
sometimes used as a synonym for 'hybrid scheme'. This is
different from [I-D.ietf-pquip-pqt-hybrid-terminology] where the
term is used as a specific instantiation of hybrid schemes such
that "where multiple cryptographic algorithms are combined to form
a single key or signature such that they can be treated as a
single atomic object at the protocol level." To avoid confusing
we will avoid the term 'composite scheme'.
* Hybrid signature: A hybrid signature is the output of the hybrid
signature scheme's signature generation. As synonyms we might use
'dual signature'. For example, NIST define a dual signature as
"two or more signatures on a common message" [NIST_PQC_FAQ]. For
the same reason as above we will avoid using the term 'composite
signature' although it sometimes appears as synonym for 'hybrid/
dual signature'.
* Component (signature) scheme: Component signature schemes are the
cryptographic algorithms contributing to the hybrid signature
scheme. This has a similar purpose as in
[I-D.ietf-pquip-pqt-hybrid-terminology]. 'Ingredient (signature)
scheme' may be used as a synonym.
* Next-generation algorithms: Following
[I-D.ietf-tls-hybrid-design], we define next-generation algorithms
to be "algorithms which are not yet widely deployed but which may
eventually be widely deployed". Hybrid signatures are mostly
motivated by preparation for post-quantum migration, hence the
reference to post-quantum algorithms through this draft. However,
the majority of the discussion in this document applies equally
well to future migration to other next-generation algorithms.
* Artifact: An artifact is evidence of the sender's intent to
hybridize a signature that remains even if a component algorithm
tag is removed. Artifacts can be e.g., at the algorithmic level
(e.g., within the digital signature), or at the protocol level
(e.g., within the certificate), or on the system policy level
(e.g., within the message). Artifacts should be easily
identifiable by the receiver in the case of signature stripping.
Bindel, et al. Expires 26 August 2024 [Page 5]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.3. Motivation for use of hybrid signature schemes
Before diving into the design goals for hybrid digital signatures, it
is worth taking a look at why hybrid digital signatures are desirable
for some applications. As many of the arguments hold in general for
hybrid algorithms, we again refer to [I-D.ietf-tls-hybrid-design]
that summarizes these well. In addition, we explicate the motivation
for hybrid signatures here.
1.3.1. *Complexity*
Next-generation algorithms and their underlying hardness assumptions
are often more complex than traditional algorithms. For example, the
signature scheme ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been
selected for standardization by NIST. While the scheme follows the
well-known Fiat-Shamir transform to construct the signature scheme,
it also relies on rejection sampling that is known to give cache side
channel information (although this does not lead to a known attack).
Likewise, the signature scheme Falcon uses complex sampling during
signature generation. Furthermore, recent attacks again the next-
generation multivariate schemes Rainbow and GeMSS might call into
question the asymptotic and concrete security for conservative
adopters and therefore might hinder adoption.
As such, some next-generation algorithms carry a higher risk of
implementation mistakes and revision of parameters compared to
traditional algorithms, such as RSA. RSA is a relatively simple
algorithm to understand and explain, yet during its existence and use
there have been multiple attacks and refinements, such as adding
requirements to how padding and keys are chosen, and implementation
issues such as cross-protocol attacks. Thus, even in a relatively
simple algorithm subtleties and caveats on implementation and use can
arise over time. Given the complexity of next generation algorithms,
the chance of such discoveries and caveats needs to be taken into
account.
Of note, next generation algorithms have been heavily vetted. Thus,
if and when further information on caveats and implementation issues
come to light, it is less likely that a "break" will be catastrophic.
Instead, such vulnerabilities and issues may represent a weakening of
security - which may in turn be offset if a hybrid approach has been
used. The complexity of post-quantum algorithms needs to be balanced
against the fact that hybridization itself adds more complexity to a
protocol and introduces the risk of implementation mistakes in the
hybridization process.
Bindel, et al. Expires 26 August 2024 [Page 6]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
One example of a next generation algorithm is the signature scheme
ML-DSA (a.k.a. CRYSTALS-Dilithium) that has been selected for
standardization by NIST. While the scheme follows the well-known
Fiat-Shamir transform to construct the signature scheme, it also
relies on rejection sampling that is known to give cache side channel
information (although this does not lead to a known attack).
Furthermore, recent attacks again the post-quantum multivariate
schemes Rainbow and GeMSS might call into question the asymptotic and
concrete security for conservative adopters and therefore might
hinder adoption.
1.3.2. *Time*
The need to transition to post-quantum algorithms now while
simultaneously being aware of potential, hidden subtleties in their
resistance to standard attacks drives transition designs towards
hybridization. Mosca’s equation [MOSCA] very simply illustrates the
risk of post-quantum transition delay: l + d > q, where l is the
information life-span, d is the time for system transition to post-
quantum algorithms, and q is the time before a quantum computer is
ready to execute cryptanalysis. As opposed to key exchange and KEMs,
it may not be obvious why there is urgency for an adoption of post-
quantum signatures; namely, while encryption is subject to store-now-
decrypt-later attacks, there may not seem to be a parallel notion for
authenticity, i.e., 'store-now-modify-later attacks'.
However, in larger systems, including national systems, space
systems, large healthcare support systems, and critical
infrastructure, where acquisition and procurement time can be
measured in years and algorithm replacement may be difficult or even
practically impossible, this equation can have drastic implications.
In such systems, algorithm turn-over can be complex and difficult and
can take considerable time (such as in long-lived systems with
hardware deployment), meaning that an algorithm may be committed to
long-term, with no option for replacement. Long-term committment
creates further urgency for immediate post-quantum algorithm
selection. Additionally, for some sectors future checks on past
authenticity plays a role (e.g., many legal, financial, auditing, and
governmental systems). The 'store-now-modify-later' analogy would
present challenges in such sectors, where future analysis of past
authentication may be more critical than in e.g., internet connection
use cases. As such there is an eagerness to use post-quantum
signature algorithms for some applications.
Bindel, et al. Expires 26 August 2024 [Page 7]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.4. Goals
There are various security goals that can be achieved through
hybridization. The following provides a summary of these goals,
while also noting where security goals are in conflict, i.e., that
achievement of one goal precludes another, such as backwards
compatibility.
1.4.1. *Hybrid Authentication*
One goal of hybrid signature schemes is security. As defined in
[I-D.ietf-pquip-pqt-hybrid-terminology], ideally a hybrid signature
scheme can achieve 'hybrid authentication' which is the property that
(cryptograpthic) authentication is achieved by the hybrid signature
scheme provided that a least one component signature algorithm
remains 'secure'. There might be, however, other goals in
competition with this one, such as backward-compatibility. Hybrid
authentication is an umbrella term that encompassess more specific
concepts of hybrid signature security, such as 'hybrid unforgability'
described next.
1.4.1.1. *Hybrid Unforgeability*
Hybrid unforgeability is a specific type of hybrid authentication,
where the security assumption for the scheme, e.g. EUF-CMA or SUF-
CMA, is maintained as long as at least one of the component schemes
is EUF-CMA (resp., SUF-CMA) secure without a prioritisation. We call
this notion 'hybrid unforgeability'; it is a specific type of hybrid
authentication. For example, the concatenation combiner in
[HYBRIDSIG] is 'hybrid unforgeable'. As mentioned above, this might
be incompatible with backward-compatibility, where the EUF-CMA
(resp., SUF-CMA) security of the hybrid signature relies solely on
the security of one of the component schemes instead of relying on
both, e.g., the dual message combiner using nesting in [HYBRIDSIG].
For more details, we refer to our discussion below.
Use cases where a hybrid scheme is used with, e.g., EUF-CMA security
assumed for only one component scheme generally use hybrid techniques
for their functional transition pathway support, while fully trusting
either the traditional or post-quantum algorithm. In contrast, use
cases where a hybrid scheme is used with e.g., EUF-CMA security
assumed for both component schemes without prioritisation can use
hybrid techniques for both functional transition and security
transition, where it may not be known which algorithm should be
relied upon.
Bindel, et al. Expires 26 August 2024 [Page 8]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.4.2. *Proof Composability*
Under proof composability, the component algorithms are combined in
such a way that it is possible to prove a security reduction from the
security properties of a hybrid signature scheme to the properties of
the respective component signature schemes and, potentially, other
building blocks such as hash functions, KDF, etc. Otherwise an
entirely new proof of security is required, and there is a lack of
assurance that the combination builds on the standardization
processes and analysis performed to date on component algorithms.
The resulting hybrid signature would be, in effect, an entirely new
algorithm of its own. The more the component signature schemes are
entangled, the more likely it is that an entirely new proof is
required, thus not meeting proof composability.
1.4.3. *Weak Non-Separability*
Non-Separability was one of the earliest properties of hybrid digital
signatures to be discussed [HYBRIDSIG]. It was defined as the
guarantee that an adversary cannot simply “remove” one of the
component signatures without evidence left behind. For example there
are artifacts that a carefully designed verifier may be able to
identify, or that are identifiable in later audits. This was later
termed Weak Non-Separability (WNS) [HYBRIDSIGDESIGN]. Note that WNS
does not restrict an adversary from potentially creating a valid
component digital signature from a hybrid one (a signature stripping
attack), but rather implies that such a digital signature will
contain artifacts of the separation. Thus authentication is not
simply provided by the sender to the receiver through correct
verification of the digital signature(s), but potentially through
further investigation on the receiver side that may extend well
beyond traditional signature verification behavior. For instance,
this can intuitively be seen in cases of a message containing a
context note on hybrid authentication, that is then signed by all
component algorithms/the hybrid signature scheme. If an adversary
removes one component signature but not the other, then artifacts in
the message itself point to the possible existence of hybrid
signature such as a label stating “this message must be hybrid
signed”. This might be a counter measure against stripping attacks if
the verifier expects a hybrid signature scheme to have this property.
However, it places the responsibility of signature validity not only
on the correct format of the message, as in a traditional signature
security guarantee, but the precise content thereof.
Bindel, et al. Expires 26 August 2024 [Page 9]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.4.4. *Strong Non-Separability*
Strong Non-Separability (SNS) is a stronger notion of WNS, introduced
in [HYBRIDSIGDESIGN]. SNS guarantees that an adversary cannot take
as input a hybrid signature (and message) and output a valid
component signature (and potentially different message) that will
verify correctly. In other words, separation of the hybrid signature
into component signatures implies that the component signature will
fail verification (of the component signature scheme) entirely.
Therefore, authentication is provided by the sender to the receiver
through correct verification of the digital signature(s), as in
traditional signature security experiments. It is not dependent on
other components, such as message content checking, or protocol level
aspects, such as public key provenance. As an illustrative example
distinguishing WNS from SNS, consider the case of component
algorithms Sigma_1.Sign and Sigma_2.Sign where the hybrid signature
is computed as a concatenation (sig_1, sig_2), where sig_1 =
Sigma_1.Sign(hybridAlgID, m) and sig_2 = Sigma_2.Sign(hybridAlgID,
m). In this case, a new message m' = (hybridAlgID, m) along with
signature sig_1 and Sigma_1.pk, with the hybrid artifact embedded in
the message instead of the signature, could be correctly verified.
The separation would be identifiable through further investigation
but the signature verification itself would not fail. Thus, this
case shows WNS (assuming the verification algorithm is defined
accordingly) but not SNS.
Some work [I-D.ounsworth-pq-composite-sigs] has looked at reliance on
the public key certificate chains to explicitly define hybrid use of
the public key. Namely, that Sigma_1.pk cannot be used without
Sigma_2.pk. This implies pushing the hybrid artifacts into the
protocol and system level and a dependency on the security of other
verification algorithms (namely those in the certificate chain).
This further requires that security analysis of a hybrid digital
signature requires analysis of the key provenance, i.e., not simply
that a valid public key is used but how its hybridization and hybrid
artifacts have been managed throughout the entire chain. External
dependencies such as this may imply hybrid artifacts lie outside the
scope of the signature algorithm itself. SNS may potentially be
achieveable based on dependencies at the system level.
1.4.5. *Backwards/Forwards Compatibility*
Backwards compatibility refers to the property where a hybrid
signature may be verified by only verifying one component signature,
allowing the scheme to be used by legacy receivers. In general this
means verifying the traditional component signature scheme,
potentially ignoring the post-quantum signature entirely. This
provides an option to transition sender systems to post-quantum
Bindel, et al. Expires 26 August 2024 [Page 10]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
algorithms while still supporting select legacy receivers. Notably,
this is a verification property; the sender has provided a hybrid
digital signature, but the verifier is allowed, due to internal
policy and/or implementation, to only verify one component signature.
Backwards compatibility may be further decomposed to subcategories
where component key provenance is either separate or hybrid so as to
support implementations that cannot recognize (and/or process) hybrid
signatures or keys.
Forwards compatibility has also been a consideration in hybrid
proposals [I-D.becker-guthrie-noncomposite-hybrid-auth]. Forward
compatibility assumes that hybrid signature schemes will be used for
some time, but that eventually all systems will transition to use
only one (particularly, only one post-quantum) algorithm. As this is
very similar to backwards compatibility, it also may imply
separability of a hybrid algorithm; however, it could also simply
imply capability to support separate component signatures. Thus the
key distinction between backwards and forwards compatibility is that
backwards compatibility may be needed for legacy systems that cannot
use and/or process hybrid or post-quantum signatures, whereas in
forwards compatibility the system has those capabilities and can
choose what to support (e.g., for efficiency reasons).
As noted in [I-D.ietf-tls-hybrid-design], ideally, forward/backward
compatibility is achieved using redundant information as little as
possible.
1.4.6. *Simultaneous Verification*
Simultaneous Verification (SV) builds on SNS and was first introduced
in [HYBRIDSIGDESIGN]. SV requires that not only are all component
signatures needed to achieve a successful verification present in the
hybrid signature, but also that verification of both component
algorithms occurs simultaneously. Namely, "missing" information
needs to be computed by the verifier so they cannot “quit” the
verification process before both component signatures are verified.
SV mimics traditional digital signatures guarantees, essentially
ensuring that the hybrid digital signature behaves as a single
algorithm vs. two separate component stages. Alternatively phrased,
under an SV guarantee it is not possible for an unerring verifier to
initiate termination of the hybrid verification upon successful
verification of one component algorithm without also knowing if the
other component succeeded or failed.
Bindel, et al. Expires 26 August 2024 [Page 11]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
1.4.7. *Hybrid Generality*
Hybrid generality means that a general signature combiner is defined,
based on inherent and common structures of component digital
signatures "categories." For instance, since multiple signature
schemes use a Fiat-Shamir Transform, a hybrid scheme based on the
transform can be made that is generalizable to all such signatures.
Such generality can also result in simplified constructions whereas
more tailored hybrid variants might be more efficient in terms of
sizes and performance.
1.4.8. *High performance*
Similarly to performance goals noted for hybridization of other
cryptographic components [I-D.ietf-tls-hybrid-design] hybrid
signature constructions are expected to be as performant as possible.
For most hybrid signatures this means that the computation time
should only minimally exceed the sum of the component signature
computation time. It is noted that performance of any variety may
come at the cost of other properties, such as hybrid generality.
1.4.9. *High space efficiency*
Similarly to space considerations in [I-D.ietf-tls-hybrid-design],
hybrid signature constructions are expected to be as space performant
as possible. This includes messages (as they might increase if
artifacts are used), public keys, and the hybrid signature. For the
hybrid signature, size should no more than minimally exceed the
signature size of the two component signatures. In some cases, it
may be possible for a hybrid signature to be smaller than the
concatenationation of the two component signatures.
1.4.10. *Minimal duplicate information*
Similarly to [I-D.ietf-tls-hybrid-design], duplicated information
should be avoided when possible. This might concern repeated
information in hybrid certificates or in the communication of
component certificates in additional to hybrid certificates (for
example to achieve backwards/forwards-compatibility), or sending
multiple public keys or signatures of the same component algorithm.
2. Non-separability spectrum
Non-separability is not a singular definition but rather is a scale,
representing degrees of separability hardness, visualized in
Figure 1.
Bindel, et al. Expires 26 August 2024 [Page 12]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
|-----------------------------------------------------------------------------|
|**No Non-Separability**
| no artifacts exist
|-----------------------------------------------------------------------------|
|**Weak Non-Separability**
| artifacts exist in the message, signature, system, application, or protocol
| ----------------------------------------------------------------------------|
|**Strong Non-Separability**
| artifacts exist in hybrid signature
| ----------------------------------------------------------------------------|
|**Strong Non-Separability w/ Simultaneous Verification**
| artifacts exist in hybrid signature and verification or failure of both
| components occurs simultaneously
| ----------------------------------------------------------------------------|
▼
Figure 1: Spectrum of non-separability from weakest to strongest.
At one end of the spectrum are schemes in which one of the component
signatures can be stripped away with the verifier not being able to
detect the change during verification. An example of this includes
simple concatenation of signatures without any artifacts used.
Nested signatures (where a message is signed by one component
algorithm and then the message-signature combination is signed by the
second component algorithm) may also fall into this category,
dependent on whether the inner or outer signature is stripped off
without any artifacts remaining.
Next on the spectrum are weakly non-separable signatures. Under Weak
Non-Separability, if one of the component signatures of a hybrid is
removed artifacts of the hybrid will remain (in the message,
signature, or at the protocol level, etc.). This may enable the
verifier to detect if a component signature is stripped away from a
hybrid signature, but that detectability depends highly on the type
of artifact and permissions. For instance, if a message contains a
label artifact "This message must be signed with a hybrid signature"
then the system must be allowed to analyze the message contents for
possible artifacts. Whether a hybrid signature offers (Weak/Strong)
Non-Separability might also depend on the implementation and policy
of the protocol or application the hybrid signature is used in on the
verifier side. Such policies may be further ambiguous to the sender,
meaning that the type of authenticity offered to the receiver is
unclear. In another example, under nested signatures the verifier
could be tricked into interpreting a new message as the message/inner
signature combination and verify only the outer signature. In this
case, the inner signature-tag is an artifact.
Bindel, et al. Expires 26 August 2024 [Page 13]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
Third on the scale is the Strong Non-Separability notion, in which
separability detection is dependent on artifacts in the signature
itself. Unlike in Weak Non-Separability, where artifacts may be in
the actual message, the certificate, or in other non-signature
components, this notion more closely ties to traditional algorithm
security notions (such as EUF-CMA) where security is dependent on the
internal construct of the signature algorithm and its verification.
In this type, the verifier can detect artifacts on an algorithmic
level during verification. For example, the signature itself may
encode the information that a hybrid signature scheme is used.
Examples of this type may be found in [HYBRIDSIGDESIGN].
For schemes achieving the most demanding security notion, Strong Non-
Separability with Simultaneous Verification, verification succeeds
not only when both of the component signatures are present but also
only when the verifier has verified both signatures. Moreover, no
information is leaked to the receiver during the verification process
on the possibile validity/invalidity of the component signatures
until both verify (or fail to verify). This construct most closely
mirrors traditional digital signatures where, assuming that the
verifier does verify a signature at all, the result is either a
positive verification of a the full signature or a failure if the
signature is not valid. For hybrid signatures, a full signature
implies the hybridization of both component algorithms, and therefore
the strongest non-separability notion enforces an all-or-nothing
approach to verification. Examples of algorithms providing this type
of security can be found in [HYBRIDSIGDESIGN].
3. Artifacts
Hybridization benefits from the presence of artifacts as evidence of
the sender's intent to decrease the risk of successful stripping
attacks. This, however, depends strongly on where such evidence
resides (e.g., in the message, the signature, or somewhere on the
protocol level instead of at the algorithmic level). Even commonly
discussed hybrid approaches, such as concatenation, are not
inherently tied to one type of security (e.g., WNS or SNS). This can
lead to ambiguities when comparing different approaches and
assumptions about security or lack thereof. Thus in this section we
cover artifact locations and also walk through a high-level
comparison of a few hybrid categories to show how artifact location
can differ within a given approach. Artifact location is tied to
non-separability notions above; thus the selection of a given
security guarantee and general hybrid approach must also include
finer grained selection of artifact placement.
Bindel, et al. Expires 26 August 2024 [Page 14]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
3.1. Artifact locations
There are a variety of artifact locations possible, ranging from
within the message to the signature algorithm to the protocol level
and even into policy, as shown in Table 1. For example, one artifact
location could be in the message to be signed, e.g., containing a
label artifact. Depending on the hybrid type, it might be possible
to strip this away. For example, a quantum attacker could strip away
the quantum-secure signature of a concatenated dual signature, and
(being able to forge, e.g., ECDSA signatures) remove the label
artifact from the message as well. So, for many applications and
threat models, adding an artificat in the message might not prevent
stripping attacks. Another artifact location could be in the public
key certificates as described in [I-D.ounsworth-pq-composite-sigs].
In yet another case, artifacts may be present through the fused
hybrid method, thus making them part of the signature at the
algorithmic level.
Eventual security analysis may be a consideration in choosing between
levels. For example, if the security of the hybrid scheme is
dependent on system policy, then cryptographic analysis must
necessarily be reliant on specific policies and it may not be
possible to describe a scheme's security in a standalone sense.
+=============================================+===========+
| Location of artifacts of hybrid intent | Level |
+=============================================+===========+
| Signature | Algorithm |
+---------------------------------------------+-----------+
| Certificate | Protocol |
+---------------------------------------------+-----------+
| Algorithm agreement / negotiation | Protocol |
+---------------------------------------------+-----------+
| Message | Policy |
+---------------------------------------------+-----------+
Table 1: Artifact placement levels
3.2. Artifact Location Comparison Example
Here we provide a high-level example of how artifacts can appear in
different locations even within a single, common approach. We look
at the following categories of approaches: concatenation, nesting,
and fusion. This is to illustrate that a given approach does not
inherently imply a specific non-separability notion and that there
are subtleties to the selection decision, since hybrid artifacts are
related to non-separability guarantees. Additionally, this
comparison highlights how artifacts placement can be identical in two
Bindel, et al. Expires 26 August 2024 [Page 15]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
different hybrid approaches.
We briefly summarize the hybrid approach categories (concatenation,
nesting, and fusion) for clarity in description, before showing how
each one may have artifacts in different locations in Table 2.
* Concatenation: variants of hybridization where, for component
algorithms Sigma_1.Sign and Sigma_2.Sign, the hybrid signature is
calculated as a concatenation (sig_1, sig_2) such that sig_1 =
Sigma_1.Sign(hybridAlgID, m) and sig_2 = Sigma_2.Sign(hybridAlgID,
m).
* Nesting: variants of hybridization where for component algorithms
Sigma_1.Sign and Sigma_2.Sign, the hybrid signature is calculated
in a layered approach as (sig_1, sig_2) such that, e.g., sig_1 =
Sigma_1.Sign(hybridAlgID, m) and sig_2 = Sigma_2.Sign(hybridAlgID,
(m, sig_1)).
* Fused hybrid: variants of hybridization where for component
algorithms Sigma_1.Sign and Sigma_2.Sign, the hybrid signature is
calculated to generate a single hybrid signature sig_h that cannot
be cleanly separated to form one or more valid component
constructs. For example, if both signature schemes are signatures
schemes constructed through the Fiat-Shamir transform, the
component signatures would include responses r_1 and r_2 and
challenges c_1 and c_2, where c_1 and c_2 are hashes computed over
the respective commitments comm_1 and comm_2 (and the message). A
fused hybrid signature could consist of the component responses,
r_1 and r_2 and and a challenge c that is computed as a hash over
both commitments, i.e., c = Hash(comm_1,comm_2,message). As such,
c does not belong to either of the component signatures but rather
both, meaning that the signatures are 'entangled'.
Bindel, et al. Expires 26 August 2024 [Page 16]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
+====+=======================+=============================+
| # | Location of artifacts | Category |
| | of hybrid intent | |
+====+=======================+=============================+
| | | *Concatenated* |
+----+-----------------------+-----------------------------+
| 1 | None | No label in message, public |
| | | keys are in separate certs |
+----+-----------------------+-----------------------------+
| 2 | In message | Label in message, public |
| | | keys are in separate certs |
+----+-----------------------+-----------------------------+
| 3 | In cert | No label in message, public |
| | | keys are in combined cert |
+----+-----------------------+-----------------------------+
| 4 | In message and cert | Label in message, public |
| | | keys are in combined cert |
+----+-----------------------+-----------------------------+
| | | *Nested* |
+----+-----------------------+-----------------------------+
| 5 | In message | Label in message, public |
| | | keys are in separate certs |
+----+-----------------------+-----------------------------+
| 6 | In cert | No label in message, public |
| | | keys are in combined cert |
+----+-----------------------+-----------------------------+
| 7 | In message and cert | Label in message, public |
| | | keys are in combined cert |
+----+-----------------------+-----------------------------+
| | | *Fused* |
+----+-----------------------+-----------------------------+
| 8 | In signature | Public keys are in separate |
| | | certs |
+----+-----------------------+-----------------------------+
| 9 | In signature and | Label in message, public |
| | message | keys are in separate certs |
+----+-----------------------+-----------------------------+
| 10 | In signature and cert | Public keys are in combined |
| | | cert |
+----+-----------------------+-----------------------------+
| 11 | In signature and | Label in message, public |
| | message and cert | keys are in combined cert |
+----+-----------------------+-----------------------------+
Table 2: Artifact locations depending on the hybrid
signature type
Bindel, et al. Expires 26 August 2024 [Page 17]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
As can be seen, while concatenation may appear to refer to a single
type of combiner, there are in fact several possible artifact
locations depending on implementation choices. Artifacts help to
support detection in the case of stripping attacks, which means that
different artifact locations imply different overall system
implementation considerations to be able to achieve such detection.
Case 1 provides the weakest guarantees of hybrid identification, as
there are no prescribed artifacts and therefore non-separability is
not achieved. However, as can be seen, this does not imply that
every implementation using concatenation fails to achieve non-
separability. Thus, it is advisable for implementors to be
transparent about artifact locations.
In cases 2 and 5 the artifacts lie within the message. This is
notable as the authenticity of the message relies on the validity of
the signature, and the artifact location means that the signature in
turn relies on the authentic content of the message (the artifact
label). This creates a risk of circular dependency. Alternative
approaches such as cases 3 and 4 solve this circular dependency by
provisioning keys in a combined certificate.
Another observation from this comparison is that artifact locations
may be similar among some approaches. For instance, case 3 and case
6 both contain artifacts in the certificate. Naturally these
examples are high-level and further specification on concrete schemes
in the categories are needed before prescribing non-separability
guarantees to each, but this does indicate how there could be a
strong similarity between such guarantees. Such comparisons allow
for a systematic decision process, where security is compared and
identified and, if schemes are similar in the desired security goal,
then decisions between schemes can be based on performance and
implementation ease.
A final observation that this type of comparison provides is how
various combiners may change the security analysis assumptions in a
system. For instance, cases 3, 4, 5, and 6 all push artifacts - and
therefore the signature validity - into the certificate chain.
Naturally the entire chain must then also use a similar combiner if a
straightforward security argument is to be made. Other cases, such
as 8, 9, 10, and 11 put artifacts within the signature itself,
meaning that these bear the closest resemblance to traditional
schemes where message authenticity is dependent on signature
validity.
Bindel, et al. Expires 26 August 2024 [Page 18]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
4. Need-For-Approval Spectrum
In practice, use of hybrid digital signatures relies on standards
specifications where applicable. This is particularly relevant in
the case of FIPS approval considerations as well as NIST, which has
provided basic guidance on hybrid signature use. NIST provides the
following guidance (emphasis added),
Assume that in a [hybrid] signature, _one signature is generated
with a NIST-approved signature scheme as specified in FIPS 186,
while another signature(s) can be generated using different
schemes_, e.g., ones that are not currently specified in NIST
standards..._hybrid signatures can be accommodated by current
standards in FIPS mode, as defined in FIPS 140, provided at least
one of the component methods is a properly implemented, NIST-
approved signature algorithm_. For the purposes of FIPS 140
validation, any signature that is generated by a non-approved
component scheme would not be considered a security function,
since the NIST-approved component is regarded as assuring the
validity of the hybrid signature. [NIST_PQC_FAQ]
The emphasized texts point to two things: 1) the signature scheme for
one of the component algorithms must be approved and 2) that said
algorithm must be properly implemented. This leaves some ambiguity
as to whether only the algorithm must be approved and well
implemented, or if that implementation must go through an approval
process as well. As such, there is a scale of approval that
developers may consider as to whether they are using at least one
approved component algorithm (1-out-of-n approved software module),
or whether the implementation of that component algorithm has gone
through an approvals review (thus making a all approved software
module). The former 1-out-of-n approved software module would
suggest a straightforward path for FIPS-140 approvals based on the
NIST guidelines; however, it is not inconceivable that using a all
approved software module could automate much of the certification
review and therefore be attractive to developers.
We provide a scale for the different nuances of approval of the
hybrid combiners. This is related to whether the combiner needs a
new approval process or falls under already approved specifications.
Bindel, et al. Expires 26 August 2024 [Page 19]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
| ---------------------------------------------------------------------------------|
| **New Algorithm**
| New signature scheme based on a selection of hardness assumptions
| Separate approval needed
| ---------------------------------------------------------------------------------|
| **No Approved Software Module**
| Hybrid combiner supports security analysis that can be reduced to
| approved component algorithms, potentially changing the component implementations
| Uncertainty about whether separate approval is needed
| ---------------------------------------------------------------------------------|
| **1-out-of-n Approved Software Module**
| Combiner supports one component algorithm and implementation in a black-box way
| but potentially changes the other component algorithm implementation(s)
| No new approval needed if the black-box component (implementation) is approved
| ---------------------------------------------------------------------------------|
| **All Approved Software Modules**
| Hybrid combiner acts as a wrapper, fully independent of the component
| signature scheme implementations
| No new approval needed if at least one component implementation is approved
| ---------------------------------------------------------------------------------|
▼
Figure 2: Generality / Need-for-approval spectrum
The first listed "combiner" would be a new construction with a
security reduction to different hardness assumptions but not
necessarily to approved (or even existing) signature schemes. Such a
new, singular algorithm relies on both traditional and nextgen
principles.
Next, is a combiner that might take inspiration from existing/
approved signature schemes such that its security can be reduced to
the security of the approved algorithms. The combiner may, however,
alter the implementations. As such it is uncertain whether new
approval would be needed as it might depend on the combiner and
changes. Such a case may potentially imply a distinction between a
need for fresh approval of the algorithm(s) and approval of the
implementation(s).
The 1-out-of-n combiner uses at least one approved algorithm
implementation in a black-box way. It may potentially change the
specifics of the other component algorithm implementations. As long
as at least one component is approved, no new approval is needed (per
[NIST_PQC_FAQ]).
In an All-Approved combiner, all algorithm implementations are used
in a blackbox way. A concatenation combiner is a simple example
(where a signature is valid if all component signatures are valid).
Bindel, et al. Expires 26 August 2024 [Page 20]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
As long as at least one component is approved, no new approval is
needed (per [NIST_PQC_FAQ]); thus as all algorithm implementations
are approved the requirement is satisfied.
5. EUF-CMA Challenges
Under traditional signature scheme security assumptions such as EUF-
CMA, the adversary 'wins' the security experiment if it can produce a
new message such that a message-signature pair (m, sig) with it
correctly verifies. This traditional security notion is challenged
under a hybrid construct.
The most straightforward comparison would be for the adversary to
attempt to produce a new message m' that a message-hybrid signature
pair (m', sig_h) correctly verifies. However, such a guarantee
depends on the signature being strongly non-separable. Otherwise, in
practical terms a security experiment must capture the case that an
existing or new message m could be verified with a component
signature, e.g., to produce (m', sig_1) that correctly verifies under
Sigma_1.Sign. Such considerations are beyond the scope of
traditional security analysis and represent considerations that would
need to be accounted for depending on the signature combiner method
chosen.
6. Security Considerations
This document discusses digital signature constructions that may be
used in security protocols. It is an informational document and does
not directly affect any other Internet draft. The security
considerations for any specific implementation or incorporation of a
hybrid scheme should be discussed in the relevant specification
documents.
7. Discussion of Advantages/Disadvantages
The design (and hence, security guarantees) of hybrid signature
schemes depend heavily on the properties needed for the application
or protocol using hybrid signatures. It seems that not all goals can
be achieved simultaneously as exemplified below.
7.1. Backwards compatibility vs. SNS.
There is an inherent mutual exclusion between backwards compatibility
and SNS. While WNS allows for a valid separation under leftover
artifacts, SNS will ensure verification failure if a receiver
attempts separation.
Bindel, et al. Expires 26 August 2024 [Page 21]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
7.2. Backwards compatibility vs. hybrid unforgeability.
Similarly, there is an inherent mutual exclusion between backwards
compatibility, when acted upon, and hybrid unforgeability as briefly
mentioned above. Since the goal of backwards compatibility is
usually to allow legacy systems without any software change to be
able to process hybrid signatures, all differences between the legacy
signature format and the hybrid signature format must be allowed to
be ignored, including skipping verification of signatures additional
to the classical signature. As such, if a system does skip an
component signature, security does not rely on the security of all
component signatures. Note that this mutual exclusion occurs at the
verification stage, as a hybrid signature that is verified by a
system that can process both component schemes can provide hybrid
unforgeability even if another (legacy) system, processing the same
hybrid signature, loses that property.
7.3. Simultaneous verification vs. low need for approval.
It seems that the more simultaneous verification is enforced by the
hybrid design, the higher is the need-for-approval as simultaneous
verification algorithms fuse (or 'entangle') the verification of the
component algorithms such that verification operations from the
different component schemes depend on each other in some way. For
example, concatenation of signatures in a black-box way without any
artefacts is, e.g., FIPS-approved, but the component signatures are
usually verified separately and no 'simultaneous verification' is
enforced.
8. Acknowledgements
This draft is based on the template of [I-D.ietf-tls-hybrid-design].
We would like to acknowledge the following people in alphabetical
order who have contributed to pushing this draft forward, offered
insights and perspectives, and/or stimulated work in the area:
Scott Fluhrer, Felix Günther, John Gray, Serge Mister, Max Pala, Mike
Ounsworth, Douglas Stebila, Brendan Zember
9. Informative References
[HYBRIDKEM]
Bindel, N., Brendel, J., Fischlin, M., Goncalves, B., and
D. Stebila, "Hybrid Key Encapsulation Mechanisms and
Authenticated Key Exchange", Post-Quantum Cryptography
pp.206-226, DOI 10.1007/978-3-030-25510-7_12, July 2019,
<https://doi.org/10.1007/978-3-030-25510-7_12>.
Bindel, et al. Expires 26 August 2024 [Page 22]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
[HYBRIDSIG]
Bindel, N., Herath, U., McKague, M., and D. Stebila,
"Transitioning to a Quantum-Resistant Public Key
Infrastructure", May 2017,
<https://eprint.iacr.org/2017/460>.
[HYBRIDSIGDESIGN]
Bindel, N. and B. Hale, "A Note on Hybrid Signature
Schemes", March 2023, <https://eprint.iacr.org/2023/423>.
[I-D.becker-guthrie-noncomposite-hybrid-auth]
Becker, A., Guthrie, R., and M. J. Jenkins, "Non-Composite
Hybrid Authentication in PKIX and Applications to Internet
Protocols", Work in Progress, Internet-Draft, draft-
becker-guthrie-noncomposite-hybrid-auth-00, 22 March 2022,
<https://datatracker.ietf.org/doc/html/draft-becker-
guthrie-noncomposite-hybrid-auth-00>.
[I-D.ietf-pquip-pqt-hybrid-terminology]
D, F., "Terminology for Post-Quantum Traditional Hybrid
Schemes", Work in Progress, Internet-Draft, draft-ietf-
pquip-pqt-hybrid-terminology-02, 2 February 2024,
<https://datatracker.ietf.org/doc/html/draft-ietf-pquip-
pqt-hybrid-terminology-02>.
[I-D.ietf-tls-hybrid-design]
Stebila, D., Fluhrer, S., and S. Gueron, "Hybrid key
exchange in TLS 1.3", Work in Progress, Internet-Draft,
draft-ietf-tls-hybrid-design-09, 7 September 2023,
<https://datatracker.ietf.org/doc/html/draft-ietf-tls-
hybrid-design-09>.
[I-D.ounsworth-pq-composite-sigs]
Ounsworth, M., Gray, J., Pala, M., and J. Klaußner,
"Composite Signatures For Use In Internet PKI", Work in
Progress, Internet-Draft, draft-ounsworth-pq-composite-
sigs-12, 11 February 2024,
<https://datatracker.ietf.org/doc/html/draft-ounsworth-pq-
composite-sigs-12>.
[MOSCA] Kaye, P., Laflamme, R., and M. Mosca, "An Introduction to
Quantum Computing, Oxford University Press", November
2007.
Bindel, et al. Expires 26 August 2024 [Page 23]
Internet-Draft hale-pquip-hybrid-spectrums February 2024
[NIST_PQC_FAQ]
National Institute of Standards and Technology (NIST),
"Post-Quantum Cryptography FAQs", 5 July 2022,
<https://csrc.nist.gov/Projects/post-quantum-cryptography/
faqs>.
[RFC4949] Shirey, R., "Internet Security Glossary, Version 2",
FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007,
<https://www.rfc-editor.org/rfc/rfc4949>.
Authors' Addresses
Nina Bindel
SandboxAQ
Email: nina.bindel@sandboxaq.com
Britta Hale
Naval Postgraduate School
Email: britta.hale@nps.edu
Deirdre Connolly
SandboxAQ
Email: deirdre.connolly@sandboxaq.com
Florence Driscoll
UK National Cyber Security Centre
Email: flo.d@ncsc.gov.uk
Bindel, et al. Expires 26 August 2024 [Page 24]