The cr.yp.to blog



2026.02.21: NSA and IETF, part 6: The structure of the debate. #pqcrypto #hybrids #nsa #ietf #chart

You've sometimes made a list of pros and cons regarding a hard decision, right? Maybe the decision turns out to be easy in the end; maybe not. Either way, making the list is useful in thinking things through.

There's a slightly modified type of list that I like to use in understanding debates about a proposal: instead of just making a linear list of claimed pros and claimed cons, I make a chart that shows that claim B is, at least conceptually, a response to claim A. These responses can be supporting arguments ("A — for example, B") or counterarguments ("A — no, B" or "A — yes, but B"). When multiple arguments and/or counterarguments are addressing the same point, I'll include that point in the chart, whether or not it was stated explicitly, so that all of the related arguments are tied to that point.

Bringing related points and examples and counterpoints together makes them easy to compare. I find this easier to use than the commonly recommended "pros on the left, cons on the right". This structure also makes it easy to spot unanswered arguments.

As an illustration of this structure, this blog post charts the debate about a particular proposal, the NSA-driven proposal for IETF to publish an RFC specifying usage of non-hybrid ML-KEM in TLS.

In this chart, "pro" means an argument for the proposal; "con" means an argument against the proposal; indenting B under A means that B is a supporting argument for A (if A and B are both pro or both con) or that B is a counterargument to A (if A and B are on opposite sides).

Here we go!

There's also a side debate about whether key reuse should be prohibited; at least one of the votes for the spec is conditional on adding such a prohibition. That debate isn't covered here.


Version: This is version 2026.02.21 of the 20260221-structure.html web page.