I just uploaded the -03 version of the ML-KEM in IKEv2 draft that Scott kindly presented in Brisbane. https://www.ietf.org/archive/id/draft-kampanakis-ml-kem-ikev2-03.html It addresses all comments so far. Thank you.
-----Original Message----- From: internet-dra...@ietf.org <internet-dra...@ietf.org> Sent: Friday, March 29, 2024 11:25 PM To: Ravago, Gerardo <g...@amazon.com>; Kampanakis, Panos <kpa...@amazon.com> Subject: [EXTERNAL] New Version Notification for draft-kampanakis-ml-kem-ikev2-03.txt CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. A new version of Internet-Draft draft-kampanakis-ml-kem-ikev2-03.txt has been successfully submitted by Panos Kampanakis and posted to the IETF repository. Name: draft-kampanakis-ml-kem-ikev2 Revision: 03 Title: Post-quantum Hybrid Key Exchange with ML-KEM in the Internet Key Exchange Protocol Version 2 (IKEv2) Date: 2024-03-29 Group: Individual Submission Pages: 10 URL: https://www.ietf.org/archive/id/draft-kampanakis-ml-kem-ikev2-03.txt Status: https://datatracker.ietf.org/doc/draft-kampanakis-ml-kem-ikev2/ HTML: https://www.ietf.org/archive/id/draft-kampanakis-ml-kem-ikev2-03.html HTMLized: https://datatracker.ietf.org/doc/html/draft-kampanakis-ml-kem-ikev2 Diff: https://author-tools.ietf.org/iddiff?url2=draft-kampanakis-ml-kem-ikev2-03 Abstract: [EDNOTE: The intention of this draft is to get IANA KE codepoints for ML-KEM. It could be a standards track draft given that ML-KEM will see a lot of adoption, an AD sponsored draft, or even an individual stable draft which gets codepoints from Expert Review. The approach is to be decided by the IPSECME WG. ] NIST recently standardized ML-KEM, a new key encapsulation mechanism, which can be used for quantum-resistant key establishment. This draft specifies how to use ML-KEM as an additional key exchange in IKEv2 along with traditional key exchanges. This Post-Quantum Traditional Hybrid Key Encapsulation Mechanism approach allows for negotiating IKE and Child SA keys which are safe against cryptanalytically-relevant quantum computers and theoretical weaknesses in ML-KEM. The IETF Secretariat _______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec