Hello ipsecme,

Regarding draft-kampanakis-ml-kem-ikev2, I am interested to know whether the 
following instantiation of the draft seems reasonable- it isn't explicitly 
provisioned for in the draft, but I don't see any issues that would prevent it 
from working.

In a scenario where a traditional key establishment algorithm is used in 
IKE_SA_INIT and ML-KEM is used in IKE_INTERMEDIATE, the draft implies (but does 
not require) that when rekeying or creating a child SA, the traditional 
algorithm would be used again in CREATE_CHILD_SA, and then ML-KEM would be used 
in IKE_FOLLOWUP_KE. I am wondering if anything would prevent ML-KEM from being 
used directly in CREATE_CHILD_SA (in other words, using only ML-KEM to rekey or 
create a child SA instead of using both the traditional algorithm and ML-KEM, 
and not using an IKE_FOLLOWUP_KE exchange)? My understanding is that a new SA 
proposal is sent in CREATE_CHILD_SA (new compared to the SA proposal in 
IKE_SA_INIT, that is), so it would be okay if ML-KEM is ADDKE1 in SA[i/r]1 but 
Key Exchange Method in the SA Payloads of CREATE_CHILD_SA.

If this seems like a reasonable option, I would support adding text to the 
draft that more explicitly allows for this as a possibility (and would gladly 
contribute some text).

I'll add that I do not consider this to be an issue that should slow down WG 
adoption of this draft in any way; I would very much like to see WG adoption 
happen soon.

Thanks,

Rebecca

Rebecca Guthrie
she/her
Center for Cybersecurity Standards (CCSS)
Cybersecurity Collaboration Center (CCC)
National Security Agency (NSA)
_______________________________________________
IPsec mailing list -- ipsec@ietf.org
To unsubscribe send an email to ipsec-le...@ietf.org

Reply via email to