**Session Date/Time:** 18 Mar 2024 03:00 # CFRG Meeting Minutes ## Summary The CFRG meeting covered a wide range of topics, including updates on existing drafts, discussions on new proposals related to post-quantum cryptography, federated machine learning, and formal analysis of TLS protocols. Key discussions revolved around hybrid key exchange mechanisms, secure aggregation techniques for privacy-preserving machine learning, and potential inconsistencies in existing TLS implementations. ## Key Discussion Points * **Hedged ECDSA/EDDSA Signatures:** * Discussed naming conventions and alignment with academic literature and NIST standards. * Addressed concerns about the order of random value and prefix for side-channel attack mitigation. * Reviewed the inclusion of test vectors and potential proofs of construction. * **GCM with Secure Short Tags (GCM-SST):** * Explained the motivation for secure short tags in GCM, particularly for radio link layers and media applications. * Compared GCM-SST with standard GCM in terms of performance and security properties. * Solicited interest from CFO (Codec Foo Optimization) working group for potential adoption. * **ML-KEM in HBKE:** * Analyzed the binding properties of DH-KEM (Diffie-Hellman Key Exchange Mechanism) in HBKE (Hybrid Public Key Encryption) and compared them to ML-KEM (Module Learning with Errors Key Encapsulation Mechanism). * Discussed potential re-encapsulation attacks and the need for strong binding of ciphertext and public key. * Considered options for modifying HBKE or adapting ML-KEM to ensure security in hybrid post-quantum scenarios. * **Mastic for VDAF:** * Presented an update on the Mastic protocol, an alternative to Poppler 1 for the heavy hitters problem. * Outlined the use cases for Mastic, including weighted heavy hitters and grouped metrics. * Discussed the progress on security analysis and implementation in Rust. * Considered replacing Poppler 1 with Mastic in the base VDAF draft. * **Private Inexpensive Norm Enforcement (Pine) for Federated Machine Learning:** * Introduced Pine, a new VDAF (Verifiable Distributed Aggregation Function) designed to support federated machine learning use cases. * Addressed the challenge of preventing wraparound effects when computing squared out to norms in field operations. * Compared Pine with Pro 3 in terms of communication cost and performance. * **Synchronous Remote Key Generation:** * Introduced a draft on synchronous remote key generation, a technique for generating non-correlatable public keys. * Explained the applications of this technique in verifiable credentials and remote secure elements. * Requested reviews and feedback on the draft. * **Hybrid PQ Cams:** * Addressed the lack of a clear consensus as to how to combine PQ and classic public key cryptography safely. * Discussed issues related to the difficulty of the certification of PQ algorithms. * Debated approaches for specifying combiners and providing general advice to protocol developers. * **Analysis of Ratls:** * Presented a formal analysis of the combination of remote attestation with TLS, focusing on the validation part of the model. * Identified potential issues related to the handshake secret and master secret generation in TLS implementations. * Solicited feedback and insights on the observed inconsistencies. ## Decisions and Action Items * **Hedged ECDSA/EDDSA Signatures:** Include test vectors in the next version. Investigate the need for proofs for the construction. * **Hybrid PQ Cams:** A design team will be formed to compile requirements for hybrid PQ cams and combine them with classic public key cryptography safely. * **Mastic for VDAF:** Post questions and discussion to the mailing list regarding whether or not to immediately replace Poppler1 with Mastic. ## Next Steps * Continue discussions on the mailing list regarding the replacement of Poppler 1 with Mastic. * Form a design team for hybrid PQ cams and develop a reasonable set of requirements. * Continue working on aligning the reference implementation with security analysis for the Mastic protocol. * Gather feedback from implementers on the Pine protocol for federated machine learning. * Continue reviewing and providing feedback on the Synchronous Remote Key Generation draft. * Continue analysis on existing TLS implementations, to ensure that no security issues or issues with spec compliance will impact remote attestation.