[Last-Call] draft-ietf-pquip-pqc-engineers-13 telechat Iotdir review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Document: draft-ietf-pquip-pqc-engineers
Title: Post-Quantum Cryptography for Engineers
Reviewer: Mališa Vučinić
Review result: Not Ready

I have reviewed draft-ietf-pquip-pqc-engineers-13 as an assigned IOTDIR
reviewer. At the moment, the document is somewhat of a tutorial, a guideline
document and a survey on different PQC techniques.  The document gathers a LOT
of information, and in many instances I found the information helpful for
understanding the threats and peculiarities of post-quantum crypto. However, I
believe the document could use a heavy editing pass as I do not believe it is
well structured and lacks a clear scope. In the following, I first provide some
high-level points that I think need to be addressed before this document is
published, and then go on to giving a set of concrete comments as I went
through the document.

Who is the target audience of this document? The document states that it is
targeted to "engineers working on crypto libraries, network security and
infrastructure planning". I believe the document in its current version does
not answer the needs of these audiences. Engineers working on crypto libraries
are arguably interested in the implementation considerations around different
algorithms. Some implementation aspects are indeed present in the document,
e.g. caveats on implementing properly the ML-DSA or FN-DSA schemes, but
completely hidden in the forest of details on cryptographic constructs
underlying the different schemes. Network security engineers are arguably
interested in deploying the available protocols, as designed by the IETF, and
understanding the properties those protocols provide. Given the state of things
at the IETF with respect to PQC and as presented by this document, most of
these works are still in progress. Again, the information is scattered around
the document making the interested reader on this aspect go through the
background of cryptographic constructs. Finally, the document also compares the
sizes of different PQC algorithms, stressing how state-of-the-art PQC affects
the existing protocols, and the available transports. An audience that I think
benefits the most from the information present in this document are protocol
designers in the IETF. I would urge the authors to restructure the document
such that each section has a clearly identified audience. Most of the
information is there, it is a matter of presenting it coherently.

>From the IoT perspective, an aspect that seems to be missing from the document
are constrained devices and the constrained radio technologies that are
particularly affected by the transition to PQC. In the IoT space, we often work
with radio technologies that have MTUs on the order of several tens of bytes
and low data rates. We did a lot of effort in the IETF (e.g. in LAKE, CoRE,
ACE,...) on defining optimized versions of the security protocols that are fit
for such environments. An aspect to consider is how PQ transition affects these
environments given that currently standardized PQC algorithms significantly
increase the key, ciphertext, signature sizes.

Specific comments:

Section 1: "PQC algorithms are intended to be resistant to attacks by quantum
computers ..." Mention classical as well as quantum computer here.

Section 1: "at a scale never before undertaken". This is IMO a bit of an
exaggeration. We have deployed new cipher suites before, and we have also
deployed new protocol versions before. Perhaps tone down.

Section 1: "but differs on some of the guidance". State briefly on what aspects
do they differ or do not mention at all.

Section 1: "It is crucial for the reader to understand that when the word 'PQC'
is mentioned in the document..." Sentence seems out of context, please rephrase.

Section 1: The paragraph on "There is ongoing discussion about whether to use
the term 'post-quantum', 'quantum-ready',..." Move to Section 2 on Terminology.

Section 4: Consider merging the section with Section 3 as the content seems to
belong there.

Section 5: Again, consider merging the section with Section 3 into a single
section.

Section 8: Define 'HDNL' upon first use. Same for 'PQ/T'.

Section 10.1: Citing I-D.draft-ietf-lake-edhoc (now RFC9528) in this context is
a bit misleading as it based on ECDH. Perhaps cite specifically Section 9.4 of
RFC9528.

Section 10.2: Is this section exhaustive? If not, why do you describe some
properties and not the others.

Section 10.2.1: You state the understanding IND-CCA2 for protocol designers yet
you do not give enough details in the section to understand IND-CCA2. Why
including it then?

Section 10.3: I am perhaps missing something obvious but I did not understand
why you included a section on HPKE here.

Section 11.4.1: There is a different level of detail throughout your document.
Here, you go ahead and give details on the parameter sets for the LMS scheme.
Why is this useful in the context of this document?

Section 11.5: The paragraph on "Note that the vast majority of Internet
protocols..." You seem to state that there is no issue with IETF protocols, yet
there might be with proprietary protocols. If you do not cite specific examples
of such protocols, then the whole paragraph can be reduced to the first
sentence.

Section 12: "The following table". Reference the table properly.

Section 14.3.2: The last paragraph which reads "At least one scheme has been
proposed...". I believe the intent of this document is not to serve as a survey
document of everything that is proposed in the IETF. Then, why include this?



-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux