Do we know which transform IDs will be used for the pre-standard PQCs
(FrodoKEM, BIKE, HQC)?

Thanks
Phil

On Wed, Jan 22, 2025 at 10:46 AM Watson Ladd <watsonbl...@gmail.com> wrote:

> On Wed, Jan 22, 2025 at 5:07 AM John Mattsson
> <john.mattsson=40ericsson....@dmarc.ietf.org> wrote:
> >
> > Hi,
> >
> >
> >
> > I think IKEv2 should register code points for FrodoKEM and BIKE/HQC
> (depending on which one NIST standardizes). I think it is important with
> backups to ML-KEM. The importance of cryptographic agility has been
> emphasized by several US agencies. A necessity for cryptographic agility is
> to have a cryptographic primitive to switch to. The practice of
> implementing cryptographic backup algorithms has long been a guiding
> principle in the telecom industry.
>
> The relevant registry is expert review, so you can just do that.
> >
> >
> >
> > FrodoKEM is unstructuctured but still lattice, BIKE/HQC is code-based
> but still structured. Many European governments are planning to use
> FrodoKEM as the main quantum-resistant algorithm for ephemeral-ephemeral
> key exchange. For an ESP association sending 100 GB of data, the overhead
> of FrodoKEM and BIKE/HQC is small.
> >
> >
> >
> > Classic McEliece could also be considered but I think it is mostly
> interesting for static encapsulation keys like in HPKE.
> >
> >
> >
> > I think CFRG should specify FrodoKEM, but I am also fine with continue
> using frodokem.org as a normative reference.
> >
> >
> >
> > Cheers,
> >
> > John
> >
> >
> >
> > From: Wang Guilin <Wang.Guilin=40huawei....@dmarc.ietf.org>
> > Date: Wednesday, 6 November 2024 at 15:22
> > To: plonga <plo...@microsoft.com>
> > Cc: ipsec <ipsec@ietf.org>, cfrg <c...@irtf.org>, Wang Guilin <
> wang.gui...@huawei.com>
> > Subject: [CFRG] [IPsec]: FrodoKEM and its usage in IKemEv2
> >
> > Dear Patrick,
> >
> >
> >
> > As disccussed during your talk about FrodoKEM in the CFRG meeting, here
> is the info about our draft.
> >
> >
> >
> > Post-quantum Hybrid Key Exchange in the IKEv2 with FrodoKEM
> >
> > draft-wang-hybrid-kem-ikev2-frodo-02
> >
> >
> https://urldefense.proofpoint.com/v2/url?u=https-3A__datatracker.ietf.org_doc_draft-2Dwang-2Dhybrid-2Dkem-2Dikev2-2Dfrodo_&d=DwIGaQ&c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&r=fi0Vudjp7ZG0vZu5L5OeeHaXSgmYikVWtQNTHRgHwrw&m=5LQXox8QmSL-AWvRaf0j7rgg6ROW0Sz4GoTvP_U2mgcDQEnoycEO3kayt4Ltf94V&s=p4VQxrO4qEcUfi47flqvqPIKvOZo7l8JSVai-1_WjeU&e=
> >
> >
> >
> > Cheers,
> >
> >
> >
> > Guilin
> >
> >
> >
> > From:Bruckert, Leonie <leonie.bruck...@secunet.com>
> >
> > To:Wang Guilin <wang.gui...@huawei.com>;ipsec <ipsec@ietf.org>
> >
> > Date:2024-11-06 10:41:21
> >
> > Subject:AW: [IPsec] Comments regarding
> draft-wang-hybrid-kem-ikev2-frodo-02
> >
> >
> >
> > Hi Guilin,
> >
> >
> >
> > Thank you for your offer. I am looking forward to working together on
> this draft.
> >
> >
> >
> > Cheers,
> > Leonie
> >
> >
> >
> > Von: Wang Guilin <wang.gui...@huawei.com>
> > Gesendet: Dienstag, 5. November 2024 15:06
> > An: Bruckert, Leonie <leonie.bruck...@secunet.com>; ipsec <
> ipsec@ietf.org>
> > Cc: Wang Guilin <wang.gui...@huawei.com>
> > Betreff: RE: [IPsec] Comments regarding
> draft-wang-hybrid-kem-ikev2-frodo-02
> >
> >
> >
> >
> > Hi, Leonie,
> >
> >
> >
> > Thanks a lot for your detailed comments.
> >
> >
> >
> > A little later, I will integrate them into a new version. I am happy to
> invite you working together on the draft.
> >
> >
> >
> > Cheers,
> >
> >
> >
> > Guilin
> >
> >
> >
> > ________________________________
> >
> >
> > Wang Guilin
> > Mobile: +65-86920345
> > Mail: wang.gui...@huawei.com
> >
> > From:Bruckert, Leonie <leonie.bruck...@secunet.com>
> >
> > To:ipsec <ipsec@ietf.org>
> >
> > Date:2024-11-05 12:15:37
> >
> > Subject:[IPsec] Comments regarding draft-wang-hybrid-kem-ikev2-frodo-02
> >
> >
> >
> > I had a closer look at the Frodo draft. Please find my comments below.
> >
> >
> >
> > Cheers,
> >
> > Leonie
> >
> >
> >
> > General comments:
> >
> > - The terminology should be aligned throughout the whole document, e.g.
> Frodo should be replaced by FrodoKEM.
> >
> > - I would add one or two sentences to the introduction like “This
> document uses the terminology defined in “Terminology for Post-Quantum
> Traditional Hybrid Schemes…”
> >
> > - I am wondering if it is sufficient to refer to the upcoming ISO
> standard or the public FrodoKEM specification document, respectively. Do we
> want or need a FrodoKEM specification from cfrg?
> >
> > - In general, I would recommend (but not require) to use FrodoKEM in
> addition to the traditional key exchange, and also mention that it can be
> used together with multiple PQ KEMs.
> >
> > - I found lots of typos, which I tried to correct in my text proposals,
> but there are probably some more.
> >
> >
> >
> > Here are some specific comments mainly regarding abstract and
> introduction:
> >
> >
> >
> > Abstract:
> >
> > When RFC 9370 was written the main motivation was to do a PQC KEM in
> addition to ECDH, but RFC 9370 does not require the first key exchange to
> be ECDH. In principle, you could do a PQC KEM in the first exchange. So, I
> would rewrite the Abstract (I also corrected a number of typos in the NEW
> text), e.g.
> >
> >
> >
> > --OLD--
> >
> > RFC 9370 specifies a framework that supports mulitple key encapsulation
> mechanisms (KEMs) in the Internet Key Exchange Protocol Version 2 (IKEv2)
> by allowing up to 7 layers of additiona KEMs employed with the oringal ECDH
> to derive the final shared secret keys for IPsec protocols. The primitive
> goal is to mitigate the security threat against quantum computers by
> hybriding additional post-quantum (PQ) KEMs with the orinigal ECDH key
> exchange. This draft specifies how one QP KEMs, FrodoKEM, is instantiated
> in the IKEv2 as the additional KEMs with the main ECDH to achieve hybrid
> key agreement.
> >
> >
> >
> > --NEW--
> >
> > “Multiple key exchanges in the Internet Key Exchange Protocol Version 2
> (IKEv2) [RFC9370] specifies a framework that supports multiple key
> encapsulation mechanisms (KEMs) in the Internet Key Exchange Protocol
> Version 2 (IKEv2) by allowing up to 7 layers of additional KEMs to derive
> the final shared secret keys for IPsec protocols. The primary goal is to
> mitigate the “harvest now and decrypt later” threat posed by
> cryptanalytically-relevant quantum computers. For this purpose, usually one
> or more post-quantum KEMs are performed in addition to the traditional
> (EC)DH key exchange. This draft specifies how the post-quantum KEM FrodoKEM
> is instantiated in IKEv2 as an additional key exchange mechanism.
> >
> >
> >
> > The link in the EDNOTE points to the wrong draft (terminology draft).
> >
> >
> >
> > Introduction:
> >
> > Some sentences are quite long and complex, so I tried to simplify a bit
> (again correcting typos). Here are my suggestions:
> >
> >
> >
> > --OLD--
> >
> > To mitigate the security threats on key exchanges again quantum
> computers, especialy the harvest-now-and-decrypt-later (HNDL) attack, the
> approach of hybrid key encapsulation mechanisms (KEMs) has been proposed to
> achieve secure key exchange if at least one of KEMs is still secure. In
> particular, hybrid KEMs is supposed to be used in the scenarios where one
> or multiple traditional KEMs are used together with one or multiple
> post-quantum KEMs [I-D.D24]. The Internet Key Exchange Protocol Version 2
> (IKEv2), which sepecifies the key exchange procedures of IPSec, has to be
> updated for quantum resistant security. For this purpose, RFC 9370
> [RFC9370] describes a framework to hybrid mulitple key encapsulation
> mechanisms (KEMs), which extends the IKEv2 by allowing multiple key
> exchanges to take place for deriving shared secret keys during a Security
> Association (SA) setup. Essentially, this speficiation employs the
> IKE_INTERMEDIATE exchange, which is a new IKE message introduced in
> [RFC9242] so that multiple key exchanges can be run to establish an IKE SA
> via exchanging additional PQ public keys and ciphertexts between a client
> and a server. RFC 9370 also introduces IKE_FOLLOWUP_KE, a new IKEv2
> exchange for realizing the same purpose when the IKE SA is being rekeyed or
> is creating additional Child SAs.
> >
> >
> >
> > --NEW--
> >
> > Cryptographically-relevant quantum computers pose a threat to
> cryptographically protected data. In particular, the so-called
> harvest-now-and-decrypt-later (HNDL) attack is considered an imminent
> threat. To mitigate this threat the concept of hybrid key encapsulation
> mechanisms (KEMs) has been proposed to achieve secure key exchange if at
> least one of the KEMs is still secure. “Multiple key exchanges in the
> Internet Key Exchange Protocol Version 2 (IKEv2) [RFC9370] specifies a
> framework to perform hybrid key encapsulation in IKEv2 by allowing multiple
> key exchanges to take place for deriving shared secret keys during a
> Security Association (SA) setup. Essentially, this specification employs
> the IKE_INTERMEDIATE exchange, which is a new IKEv2 message introduced in
> “Intermediate Exchange in the Internet Key Exchange Protocol Version 2
> (IKEv2)” [RFC9242], so that multiple key exchanges can be run to establish
> an IKE SA via exchanging additional PQ public keys and ciphertexts between
> a client and a server. RFC 9370 also introduces IKE_FOLLOWUP_KE, a new
> IKEv2 exchange for realizing the same purpose when the IKE SA is being
> rekeyed or additional Child SAs are created.
> >
> >
> >
> >
> >
> > --OLD--
> >
> > However, RFC 9370 just specifies the framework of hybrid KEMS but it has
> not been instantiated for concrete multiple KEMS. [I-D.KR24] desribes how
> the framework given by RFC 9370 can be run with the post-quantum (PQ)
> ML-KEM [FIPS203], previously called Kyber, which is the standard published
> by NIST in August of 2024. However, on the one hand, FRC 9350 allows up to
> 7 layers of additiona KEMs employed with the oringal ECDH to derive final
> shared secret keys for the IKEv2. On the other hand, for some applications
> (e.g. financial services) demanding high security level, additional PQ KEMs
> may be desired for completing the hybrid KEMs for the IKEv2. Currently, ISO
> is now standardizing three PQ KEM aglorithms: Kyber, FrodoKEM, and classic
> McElliece. Note that Frodo [Frodo] is unstructured lattice based KEM, whose
> security is more conservative compared to ML-KEM, which is based on
> structured lattice. Therefore, this draft is motivated to describe
> concretely how the frame of hybrid KEMs for the IKEv2 specified in RFC 9370
> can be run via hybriding the ogirinal ECDH and FrodoKEM, even with ML-KEM
> together, if necessary.
> >
> >
> >
> > --NEW--
> >
> > However, RFC 9370 just specifies the framework of hybrid KEMS and has to
> be been instantiated for concrete KEMS by separate documents. [I-D.KR24]
> describes how the framework given by RFC 9370 can be run with the ML-KEM
> [FIPS203], previously called Kyber. which has been standardized by NIST in
> August 2024. However, on the one hand, RFC 9350 allows up to 7 layers of
> additional KEMs to derive final shared secret keys for the IKEv2. On the
> other hand, for some applications (e.g. financial services) demanding high
> security level, additional PQ KEMs may be desired for use with RFC 9370.
> Currently, ISO is standardizing three PQ KEM algorithms (EDNOTE: we may
> want to change the wording since the ISO standard will be finished
> eventually): Kyber, FrodoKEM, and Classic McEliece. Note that FrodoKEM
> [Frodo] is unstructured lattice based KEM, whose security is more
> conservative compared to ML-KEM, which is based on structured lattice.
> Therefore, this draft is motivated to describe concretely how the frame of
> hybrid KEMs for the IKEv2 specified in RFC 9370 can be instantiated with
> FrodoKEM. FrodoKEM should be used together with a traditional key exchange
> mechanism such as ECDH and in addition, may be used with further KEMs e.g.
> ML-KEM.
> >
> >
> >
> >
> >
> > Further issues in introduction:
> >
> > - Second bullet point: Add a reference for the break of SIKE
> >
> > - typos in last paragraph: performace -> performance, triger -> trigger
> >
> >
> >
> >
> >
> > More typos:
> >
> > - section 3, last paragraph:
> >                stardandization -> standardization
> >                performace -> performance
> >                showen -> shown
> >                roughtly -> roughly
> >                triger -> trigger
> >
> >
> >
> >
> >
> >
> >
> > _______________________________________________
> > CFRG mailing list -- c...@irtf.org
> > To unsubscribe send an email to cfrg-le...@irtf.org
>
>
>
> --
> Astra mortemque praestare gradatim
>
> _______________________________________________
> IPsec mailing list -- ipsec@ietf.org
> To unsubscribe send an email to ipsec-le...@ietf.org
>
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to