The IETF TLS chairs have now issued a "last call" for objections to non-hybrid signatures in TLS. Do they admit that their previous "last call" re non-hybrid KEMs ended up with a _majority_ in opposition, and that many opposition statements obviously also apply to signatures? No.

@djb

Why do they want non-hybrid KEMs and signatures, anyway? Seems like a bad idea to protect all of everything with nothing but unproven crypto.

@argv_minus_one I have an introductory chart https://blog.cr.yp.to/20260221-structure.html showing the arguments and counterarguments.

Most common argument from proponents: NSA is asking for non-hybrids, ergo support non-hybrids. This argument works for (1) companies chasing NSA money, (2) companies that take any excuse for extra options as a barrier to entry for competitors, and (3) people who think that "NSA Cybersecurity" isn't a conduit for https://www.eff.org/files/2014/04/09/20130905-guard-sigint_enabling.pdf but rather an independent pro-security agency.

@darkuncle Sorry to see you promoting this. He's done great work, but this whole thread is crazy conspiracy thinking.

@rsalz DJB sees a conspiracy where one may not exist ... but has a history of seeing one where it did very much in fact exist.

I think cryptographers erring on the side of extreme caution is a net benefit (and his points about unjustified and unexplained foot-dragging and resistance on Classic McEliece adoption have been well documented)

@rsalz I feel like the whole Dual_EC_DRBG saga kind of permanently poisoned the well here
@darkuncle At the time of Dual_EC, NIST was required by law to take NSA's advice. They no longer are. But what history of seeing conspiracy where it did exist are you thinking of?

@rsalz Dual_EC specifically is an example of NSA hijacking the standards process for nefarious purposes. Maybe that was the only one ever, and an anomaly! (But see also DES back in the 90s ...)

But it would be wise to proceed with skepticism on all future contributions from a source that proved to be a bad actor. When an actor has a documented history of bad behavior, it's both natural and wise that all their future behavior face extra scrutiny and skepticism.

More recently, the arguments against hybrids seem ... weak. See e.g., https://blog.cr.yp.to/20240102-hybrid.html and https://blog.cr.yp.to/20251004-weakened.html (which has six sequels)

@darkuncle I don't recall Dan suspecting dual EC but I may just be forgetting that. NIST, however did learn their lesson and sponsored global contests for AES post quantum etc. Not NSA.
@rsalz NSA and other intel agencies still influencing standards process (see prior links), which is what I think is cause for skepticism if not suspicion
@darkuncle as an active participant in many of the working groups, and colleagues with NSA and others, I do not believe there is any covert influence happening. His arguments have devolved to little more than ad hominem attacks. Kind of sad. I've known him for 30 years.
@rsalz this is good news in terms of engagement from the agency! However, given their mission to subvert foreign comms (that primarily rely on the same standards to which NSA contributes) that at least we should consider where incentives lie.
@rsalz @darkuncle This is an very naive stance. Ofcourse they are. It's their god given purpose on earth. As long as the NSA is tasked to know more about me than for me to know more about them, my decision is made. Also "I've know him for 30 years" is an ad hominem in itself.
@darkuncle Yes, erring on the side of extreme caution is right. But you completely discount Bas Westerban, Sophie Schmeig, etc?
@rsalz not at all! Bas and Sophie in particular are awesome cryptographers and good people; I'm just saying that proceeding with the assumption that cryptographic proposals from NSA require greater-than-average skepticism seems wise based on the history.

@darkuncle @rsalz

DJB has always been touchy and can really get into the weeds on some conspiracy theory. really smart guy but i tend to take his rants with a heavy grain of salt.

it's been this way since early usenet days.

@paul_ipv6 @rsalz as they say, just because you're paranoid doesn't mean they aren't after you. :)
@djb @rsalz @darkuncle We can try to amend such kind of dangerous situations with a new draft.
@djb @darkuncle no I do not, but that does not mean that the NSA is corrupting the IETF.
@rsalz @darkuncle Let me see if I understand. You're agreeing that NSA has a large budget to sabotage "standards and specification for commercial public key technologies" etc., but you presume that this doesn't include IETF, since the document doesn't _specifically_ name IETF? Also, just checking: by the same logic, you presume that this doesn't include ISO? NIST? IEEE? When we recommend proactive steps to protect SDOs against sabotage, you accuse us of being crazy conspiracy theorists?
@djb @darkuncle I presumed nothing. Read what I wrote. Twisting words to win an argument. Your better than this Dan.
@rsalz @djb Do you have any evidence of that last statement, Rich?
@paulehoffman Very funny. :). And sad :(

@paulehoffman @rsalz Paul, great to see you showing up here!

We're currently discussing Rich's delusion that NSA doesn't attack IETF. On that topic, can you please state for the record how much NSA paid you for your promotion of TLS randomness extensions in IETF (https://web.archive.org/web/20260331174508/https://sockpuppet.org/blog/2015/08/04/is-extended-random-malicious/)? Or are you denying that this happened?

Also, do you dispute https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/checkoway saying that Dual EC becomes thousands of times cheaper to attack whenever those randomness extensions are deployed?

Is Extended Random A Malicious NSA Plot? — Quarrelsome

@rsalz @darkuncle You wrote "this whole thread is crazy conspiracy thinking" but I'm unable to figure out what you're disputing, i.e., what specifically you're claiming is a conspiracy theory. You _don't_ seem to be questioning the authenticity of https://www.eff.org/files/2014/04/09/20130905-guard-sigint_enabling.pdf, an internal NSA document on NSA's massive budget to weaken "standards and specification for commercial public key technologies" etc. so as to make those "exploitable". What, then, _are_ you disputing?

@djb @darkuncle

Everything I wrote is simple and consistent and, if you look at the context of when they were made, easy to follow. For those just jumping in.

1. As a long-time person involved with the IETF I have not seen any hidden/coercive NSA involvement.

2. I accept that the EFF budget piece is accurate.

3. The term "crazy conspiracy thinking" referred to your blog posts on this topic.

I do not argue with NSA/NIST and pointed out why they could do that in the past. I find it amusing that ISO refused to standardize NSA's Simon and Speck. Perhaps they're not as good at influence as they used to be.

@rsalz @djb @darkuncle dumb questions from the sidelines:

1: doesn’t it make sense to treat NSA preferences with a bit of suspicion given their history and mission?

2: if there is strong opposition to non-hybrid, besides djb’s, doesn’t that bear listening to? What’s the benefit here in overriding the concerns?

Very much not a crypto expert, I’m assuming there’s a lot I don’t know or understand here. Appreciate any answers.

@jzb To answer your questions:

1. If it were only the NSA, sure, be suspicious. But it's not (IEEE, Ericsson I believe, others) and I do not believe they were all cofrupted.

2. Sure, the IETF is having that discussion. See what you think of https://github.com/tlswg/draft-ietf-tls-mlkem/pull/14/changes for example.

Rework security considerations by richsalz · Pull Request #14 · tlswg/draft-ietf-tls-mlkem

Rather than do what issues 10 and 11 request, this instead does a very light comparison from the hybrid ML-KEM draft, based on what each document says in its IANA recommendations. Fixes: #10,#11

GitHub
@jzb @rsalz @darkuncle Side note re "crypto expert": The issue here is basic security risk management. For example, Google and Cloudflare tried ECC+SIKE (CECPQ2b: https://web.archive.org/web/20260411125124/https://blog.cloudflare.com/the-tls-post-quantum-experiment/) for tens of millions of user connections, and then SIKE was publicly broken years later. The only reason this didn't immediately expose all those user connections to attackers is that the connections were still encrypted with ECC.
The TLS Post-Quantum Experiment

Take a look at the results of a real-world TLS post-quantum experiment conducted by Cloudflare & Google.

The Cloudflare Blog
@rsalz @darkuncle NSA has a huge budget to "covertly influence and/or overtly leverage" cryptographic designs: https://www.eff.org/files/2014/04/09/20130905-guard-sigint_enabling.pdf NSA _paying_ the RSA company to put Dual EC into RSA's BSafe library (https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220/) is an example of overt leverage towards the RSA company, and of covert influence for the public not knowing about this. Same for NSA _paying_ companies to put non-hybrids into products. Do you dispute these examples of covert influence and/or overt leverage? If so, why?
@djb @darkuncle I didn't dispute the RSA thing. I don't know about the other things you claimed.

@rsalz @darkuncle Okay, so you're not disputing the authenticity of https://www.reuters.com/article/us-usa-security-rsa-idUSBRE9BJ1C220131220/ regarding NSA paying the RSA company to roll out Dual EC.

Now let's look at an IETF part of the Dual EC story. Are you disputing the accuracy of, e.g., https://web.archive.org/web/20251229182801/https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/ and https://web.archive.org/web/20260331174508/https://sockpuppet.org/blog/2015/08/04/is-extended-random-malicious/ saying NSA paid your colleagues Paul Hoffman and Eric Rescorla to coauthor with NSA a series of IETF drafts on "Extended Random" etc.? The payment is again overt leverage towards the consultants.

@rsalz

Do you have another explanation for the inexplicable push for the IETF to specify non-hybrid ML-KEM?

I looked at the list of arguments compiled by @djb at https://blog.cr.yp.to/20260221-structure.html and I don't see any particularly compelling argument in favor of such a move. Nor can I think of one myself. Certainly nothing to justify going full speed ahead like this.

@darkuncle

@argv_minus_one

"Do you have another explanation for the inexplicable push for the IETF to specify non-hybrid ML-KEM?" I don't know why you see it as inexplicable. Some people want it for various reasons, and not because they are NSA fronts.

I can see various places where the size differential (time, bits on the wire, CPU cost) are not negligible to the environment, or where the cost of eventually transitioning off hybrid are not practical (subs, satellites, zillions of telephone poles, etc).

@rsalz

The cost argument sounds like splitting hairs, to be honest.

RSA is far more costly than X25519—that's why we're using X25519 in the first place—and people were routinely running RSA on basic home PCs in the 1990s.

The phone in my pocket is a world-class supercomputer by 1990s standards. It can *easily* run ML-KEM+X25519. Let alone what a big beefy server can do.

@rsalz

As for satellites and telephone poles, I wasn't under the impression that those do encryption at all. But even if they do, since when was the nature of that encryption defined by the IETF TLS committee? They can use ML-KEM alone if they really want to, can they not? I don't see why they would need the IETF's permission.

@argv_minus_one Well, I don't presume to know all the operating environments. Are you sure you do? :)
@djb I am glad your work on cryptography is better than your comprehension of what I write. "you presume this doesn't include the IETF since the document doesn't _specifically_ name the IETF." Ye gods man, read it again.
@rsalz You aren't challenging the authenticity of https://www.eff.org/files/2014/04/09/20130905-guard-sigint_enabling.pdf on NSA's massive budget to "covertly influence and/or overtly leverage" cryptography including "standards and specification for commercial public key technologies" to make all of this "exploitable". But, when there's an effort to protect IETF against such sabotage, you claim that "this thread is crazy conspiracy thinking". I ask you to say what exactly you're claiming is a conspiracy theory, and you seem unable to answer.
@rsalz Your response to the NSA budget document was "that does not mean that the NSA is corrupting the IETF". This _sounds_ to me like you're saying: well, yeah, NSA has a huge budget to attack standards and specs, but imagining that they're specifically attacking IETF is "crazy conspiracy thinking". I tried asking whether this is what you meant; you said no. Um, okay, then what exactly _are_ you claiming is "crazy conspiracy thinking"? (Edit: corrected quote "theory" -> "thinking".)