<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY RFC2119 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC8174 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
<!ENTITY RFC8446 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
<!ENTITY RFC8998 SYSTEM "https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8998.xml">
]>


<rfc ipr="trust200902" docName="draft-yang-tls-hybrid-sm2-mlkem-03" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="TLSv1.3 hybrid SM2-MLKEM Key Exchange">Hybrid Post-quantum Key Exchange SM2-MLKEM for TLSv1.3</title>

    <author initials="P." surname="Yang" fullname="Paul Yang">
      <organization>Lenovo</organization>
      <address>
        <postal>
          <street>Building 2, No.10 Courtyard Xibeiwang East Road, Haidian District</street>
          <city>Beijing</city>
          <code>100085</code>
          <country>China</country>
        </postal>
        <phone>+86-10-5886-8888</phone>
        <facsimile>+86-10-5886-6630</facsimile>
        <email>yangyang86@lenovo.com</email>
      </address>
    </author>
    <author initials="C." surname="Peng" fullname="Cong Peng">
      <organization>Wuhan University</organization>
      <address>
        <postal>
          <street>Dongxihu District</street>
          <city>Wuhan</city>
          <code>430000</code>
          <country>China</country>
        </postal>
        <phone>+86-186-7403-6424</phone>
        <email>cpeng@whu.edu.cn</email>
      </address>
    </author>
    <author initials="J." surname="Hu" fullname="Jin Hu">
      <organization>Infosec</organization>
      <address>
        <postal>
          <street>Haidian District</street>
          <city>Beijing</city>
          <code>100096</code>
          <country>China</country>
        </postal>
        <phone>+86-158-7172-6539</phone>
        <email>hujin@infosec.com.cn</email>
      </address>
    </author>
    <author initials="S." surname="Sun" fullname="Shine Sun">
      <organization>Goodix</organization>
      <address>
        <postal>
          <street>No.1 Meikang Road,Futian District</street>
          <city>Shenzhen</city>
          <code>518000</code>
          <country>China</country>
        </postal>
        <phone>+86-138-7138-9521</phone>
        <email>sunjinlong@goodix.com</email>
      </address>
    </author>

    <date year="2025" month="November" day="15"/>

    <area>Security</area>
    <workgroup>TLS</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 132?>

<t>This document specifies how to form a hybrid key exchange with CurveSM2
and MLKEM in Transport Layer Security (TLS) protocol version 1.3.</t>

<t>Related IETF drafts include <xref target="hybrid"/> and <xref target="ecdhe-mlkem"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 140?>

<section anchor="intro"><name>Introduction</name>

<t>This document introduces one new NamedGroup and related key exchange scheme in TLSv1.3 protocol.
This NamedGroup is used in the Supported Groups extension during the handshake procedure of
TLSv1.3, to achieve a hybrid key exchange in combination with the post-quantum key exchange algorithm
ML-KEM768 (<xref target="FIPS203"/>):</t>

<figure><artwork><![CDATA[
   NamedGroup curveSM2MLKEM768 = { 4590 (0x11EE) };
]]></artwork></figure>

<t>This new NamedGroup uses an elliptic curve called curveSM2 which is defined in SM2 related
standards. Those standards are either published by international standard organizations
or by Chinese standard organizations. Please read <xref target="sm2-curve"/>.</t>

<section anchor="sm2-curve"><name>The SM2 Elliptic Curve</name>

<t>SM2, ISO/IEC 14888-3:2018 <xref target="ISO-SM2"/> (as well as in <xref target="GBT.32918.2-2016"/>)
is a set of elliptic curve based cryptographic algorithms including digital signature,
public key encryption and key exchange scheme. In this document, only the
SM2 elliptic curve is involved, which has already been added assigned by IANA.</t>

<t>Please read <xref target="curvesm2"/> for more information.</t>

</section>
<section anchor="term"><name>Terminology</name>

<t>Although this document is not an IETF Standards Track publication it
adopts the conventions for normative language to provide clarity of
instructions to the implementer, and to indicate requirement levels
for compliant TLSv1.3 implementations.</t>

<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
&quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and
&quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14
<xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals,
as shown here.</t>

</section>
</section>
<section anchor="definitions"><name>Hybrid Key Exchange Scheme Definitions</name>

<section anchor="tls-versions"><name>TLS Versions</name>

<t>The new supported group item and related key exchange scheme defined in this document
are only applicable to TLSv1.3.</t>

<t>Implementations of this document MUST NOT apply this supported group or
key exchange scheme to any older versions of TLS.</t>

</section>
<section anchor="curvesm2"><name>CurveSM2</name>

<t>The hybrid key exchange scheme defined in this document uses a fixed elliptic curve
parameter set defined in <xref target="GBT.32918.5-2016"/>. This curve has the name curveSM2.</t>

<t>As per <xref target="RFC8998"/>, the SM2 elliptic curve ID used in the Supported Groups extension is defined as:</t>

<figure><artwork><![CDATA[
      NamedGroup curveSM2 = { 41 };
]]></artwork></figure>

<t>Implementations of the hybrid key exchange mechanism defined in this document MUST conform to
what <xref target="GBT.32918.5-2016"/> requires, that is to say, the only valid elliptic curve
parameter set for SM2 signature algorithm (a.k.a curveSM2) is defined as follows:</t>

<figure><artwork><![CDATA[
   curveSM2: a prime field of 256 bits

   y^2 = x^3 + ax + b

   p  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        FFFFFFFF 00000000 FFFFFFFF FFFFFFFF
   a  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        FFFFFFFF 00000000 FFFFFFFF FFFFFFFC
   b  = 28E9FA9E 9D9F5E34 4D5A9E4B CF6509A7
        F39789F5 15AB8F92 DDBCBD41 4D940E93
   n  = FFFFFFFE FFFFFFFF FFFFFFFF FFFFFFFF
        7203DF6B 21C6052B 53BBF409 39D54123
   Gx = 32C4AE2C 1F198119 5F990446 6A39C994
        8FE30BBF F2660BE1 715A4589 334C74C7
   Gy = BC3736A2 F4F6779C 59BDCEE3 6B692153
        D0A9877C C62A4740 02DF32E5 2139F0A0
]]></artwork></figure>

<t>The above elliptic curve parameter set is also previously defined in <xref target="RFC8998"/>.</t>

</section>
<section anchor="kx"><name>Hybrid Key Exchange</name>

<section anchor="hello-messages"><name>Hello Messages</name>

<t>The use of the hybrid named group defined by this document is negotiated during
the TLS handshake with information exchanged in the Hello messages.</t>

<t>The main procedure follows what <xref target="hybrid"/> defines. That is to say, the
non-post-quantum part (a.k.a. the ECDHE part) of the hybrid key exchange is based
on standard ECDH with curveSM2.</t>

<section anchor="clienthello"><name>ClientHello</name>

<t>To use the hybrid named group curveSM2MLKEM768 defined by this document, a TLSv1.3
client MUST include &#39;curveSM2MLKEM768&#39; in the &#39;supported_groups&#39; extension of the
ClientHello structure defined in Section 4.2.7 of <xref target="RFC8446"/>.</t>

<t>Then the TLS client&#39;s &#39;key_exchange&#39; value of the &#39;key_share&#39; extension is the
concatenation of the curveSM2 ephemeral share and ML-KEM768 encapsulation key.</t>

<t>The ECDHE share is the serialized value of the uncompressed ECDH point representation
as defined in Section 4.2.8.2 of <xref target="RFC8446"/>.  The size of the client share is 1249 bytes
(65 bytes for the curveSM2 public key and 1184 bytes for ML-KEM).</t>

</section>
<section anchor="serverhello"><name>ServerHello</name>

<t>If a TLSv1.3 server receives a ClientHello message containing the hybrid named group
curveSM2MLKEM768 defined in this document, it MAY choose to negotiate on it.</t>

<t>If so, then the server MUST construct its &#39;key_exchange&#39; value of the &#39;key_share&#39;
extension as the concatenation of the server&#39;s ephemeral curveSM2 share encoded in
the same way as the client share and an ML-KEM ciphertext encapsulated by the client&#39;s
encapsulation key. The size of the server share is 1153 bytes (1088 bytes for the
ML-KEM part and 65 bytes for curveSM2).</t>

</section>
</section>
<section anchor="key-scheduling"><name>Key Scheduling</name>

<t>According to <xref target="hybrid"/>, the shared secret is calculated in a &#39;concatenation&#39;
approach: the two shared secrets are concatenated together and used as the
shared secret in the standard TLSv1.3 key schedule.</t>

<t>Thus for curveSM2MLKEM768, the shared secret is the concatenation of the
ECDHE and ML-KEM shared secret.  The ECDHE shared secret is the x-coordinate
of the ECDH shared secret elliptic curve point represented as an octet string
as defined in Section 7.4.2 of <xref target="RFC8446"/>. 
The size of the shared secret is 64 bytes (32 bytes for each part).</t>

<t>Both client and server MUST calculate the ECDH part of the shared secret as
described in Section 7.4.2 of <xref target="RFC8446"/>.</t>

<t>As already described in <xref target="RFC8998"/>, SM2 is actually a set of cryptographic
algorithms including one key exchange protocol which defines methods such as
key derivation function, etc. This document does not use an SM2 key exchange
protocol, and an SM2 key exchange protocol SHALL NOT be used in the hybrid key exchange
scheme defined in <xref target="kx"/>. Implementations of this document MUST always conform to
what TLSv1.3 <xref target="RFC8446"/> and its successors require about the key derivation and
related methods.</t>

</section>
</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA has assigned the value 4590 (0x11EE) with the name &#39;curveSM2MLKEM768&#39;, to the
&quot;TLS Supported Groups&quot; registry:&#39;</t>

<texttable>
      <ttcol align='right'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='left'>DTLS-OK</ttcol>
      <ttcol align='left'>Recommended</ttcol>
      <ttcol align='left'>Reference</ttcol>
      <c>4590 (0x11EE)</c>
      <c>curveSM2MLKEM768</c>
      <c>No</c>
      <c>No</c>
      <c>this RFC</c>
</texttable>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>At the time of writing, there are no security issues
have been found for relevant algorithms.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">

&RFC2119;
&RFC8174;
&RFC8446;
&RFC8998;
<reference anchor="ISO-SM2" target="https://www.iso.org/standard/76382.html">
  <front>
    <title>IT Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms</title>
    <author >
      <organization>International Organization for Standardization</organization>
    </author>
    <date year="2018" month="November"/>
  </front>
  <seriesInfo name="ISO" value="ISO/IEC 14888-3:2018"/>
</reference>
<reference anchor="FIPS203" target="https://doi.org/10.6028/nist.fips.203">
  <front>
    <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
    <author >
      <organization>National Institute of Standards and Technology</organization>
    </author>
    <date year="2024" month="August"/>
  </front>
  <seriesInfo name="DOI" value="10.6028/nist.fips.203"/>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">

<reference anchor="GBT.32918.2-2016" target="http://www.gmbz.org.cn/upload/2018-07-24/1532401673138056311.pdf">
  <front>
    <title>Information security technology --- Public key cryptographic algorithm SM2 based on elliptic curves --- Part 2: Digital signature algorithm</title>
    <author >
      <organization>Standardization Administration of China</organization>
    </author>
    <date year="2017" month="March" day="01"/>
  </front>
  <seriesInfo name="GB/T" value="32918.2-2016"/>
</reference>
<reference anchor="GBT.32918.5-2016" target="http://www.gmbz.org.cn/upload/2018-07-24/1532401863206085511.pdf">
  <front>
    <title>Information security technology --- Public key cryptographic algorithm SM2 based on elliptic curves --- Part 5: Parameter definition</title>
    <author >
      <organization>Standardization Administration of China</organization>
    </author>
    <date year="2017" month="March" day="01"/>
  </front>
  <seriesInfo name="GB/T" value="32918.5-2016"/>
</reference>
<reference anchor="hybrid" target="https://datatracker.ietf.org/doc/html/draft-ietf-tls-hybrid-design-11">
  <front>
    <title>Hybrid key exchange in TLS 1.3</title>
    <author >
      <organization>Stebila, D., Fluhrer, S., and S. Gueron</organization>
    </author>
    <date year="2024" month="October" day="07"/>
  </front>
  <seriesInfo name="Work in Progress, Internet-Draft" value=""/>
</reference>
<reference anchor="ecdhe-mlkem" target="https://datatracker.ietf.org/doc/html/draft-kwiatkowski-tls-ecdhe-mlkem-03">
  <front>
    <title>Post-quantum hybrid ECDHE-MLKEM Key Agreement for TLSv1.3</title>
    <author >
      <organization>Kris Kwiatkowski, Panos Kampanakis, Bas Westerbaan, Douglas Stebila</organization>
    </author>
    <date year="2024" month="December" day="24"/>
  </front>
  <seriesInfo name="Work in Progress, Internet-Draft" value=""/>
</reference>


    </references>

</references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

