Dear all, The below is my review on draft-reddy-ipsecme-ikev2-pqc-auth-04. I also support for adoption but not sure if the issue 0 list mentioned should be considered together.
=========================== REVIEW on draft-reddy-ipsecme-ikev2-pqc-auth-04 Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) using PQC https://www.ietf.org/archive/id/draft-reddy-ipsecme-ikev2-pqc-auth-04.html 0 (Main Comment): Both this draft and the following draft specifies how to use ML-DSA in the IKEv2, though not via the same approach. Namely, this one uses a SIGNATURE_HASH_ALGORITHMS notify, but [draft-sfluhrer-ipsecme-ikev2-mldsa-00] uses a SUPPORTED_AUTH_METHODS Notify defined in [RFC9593]. So, how to deal with the overlapping here? Consider both in the WG or either of them? draft-sfluhrer-ipsecme-ikev2-mldsa-00 IKEv2 Support of ML-DSA https://datatracker.ietf.org/doc/draft-sfluhrer-ipsecme-ikev2-mldsa/ 1. SLH-DSA has very short public key (32-64 bytes) , but the signature is still a little long (7kB-29kB for the short versions), and signing is much slower than M-DSA (40 times, hundreds times or more, even for fast versions). So, adding some motivations here could be useful to explain why SLH-DSA is also good for the IKEv2. 2. It seems better to give a few tables to compare ML-DSA and SLH-DSA, like key size, digital signature size, and the speed of keyGen, Signing and Verifying. Such info is helpful to users when they need to select ML-DSA or SLH-DSA in their scenario. Noticed that conservative security mentioned in the end of Section 4, but efficiency discussion for SLH-DSA may be also important. 3. In Section 4, "The small version prioritizes smaller signature sizes, making them suitable for resource-constrained environments IoT devices. " Here, any literature or experiments show that SLH-DSA is really good for IoT devises? 4. Beginning of Section 5: It seems better if some text can be given to explain how exactly "a SIGNATURE_HASH_ALGORITHMS notify with an "Identity" (5) hash function' is used to negotiate which particular algorithm of LML-DSA or SLH-DSA will be selected for the IKEv2. 5. Section 5.1: "These methods are equivalent, and so either may be used." This is hard for me to understand: Which is equivalent to which one? And in which sense that they are equivalent? Some minor comments on wording: - Section 1: "Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA signatures, Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) and ECDSA." For this one, it seems better to be more specific via using the exact terms in the "IKEv2 Authentication Method" registry. So, maybe something like this: "Currently, traditional digital signatures are defined for use within IKE_AUTH: RSA Digital Signature (1),DSS Digital Signature (3). ECDSA with three sets of parameters (9, 10, 11), and Digital Signature (14), as listed in the "IKEv2 Authentication Method", maintained by IANA (https://www.iana.org/assignments/ikev2-parameters/ikev2-parameters.xhtml)." Moreover, it may be worth to say some more words about Digital Signature (14), as this is a general method, which does not specify a particular by itself. - Section 3: - "ML-DSA [FIPS204] is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness lattice problems over module lattices" ==> "ML-DSA [FIPS204] is a digital signature algorithm (part of the CRYSTALS suite) based on the hardness of lattice problems over module lattices" -"... based FS schemes compact and secure", Here "FS scheme" not defined yet really, though the reader may guess it may refer "Fiat-Shamir with Aborts" [Lyu09]. Also, not sure if it is good to call this "FC scheme" as it is an approach following FC work but improved by Lyubashevsky. -Section 7: "it trusts a certificate authority certificate signed by an ML-DSA or SLH-DSA key." Here, should "a certificate authority certificate" be replaced by "a certification authority certificate"? -Section 7: "[I-D.ietf-ipsecme-ikev2-auth-announce]" is now RFC 9593. =========================== Guilin -----Original Message----- From: Michael Richardson <mcr+i...@sandelman.ca> Sent: Saturday, 1 March 2025 3:37 am To: ipsec@ietf.org Subject: [IPsec] Re: WG Adoption call of draft-reddy-ipsecme-ikev2-pqc-auth Panwei \(William\) <william.panwei=40huawei....@dmarc.ietf.org> wrote: > The PQC algorithms, such as ML-DSA and SLH-DSA, don't perfectly fit > with the original IKEv2 authentication architecture. For example, this > is discussed in Section 5.2 of the document. So, we need to consider > how to process with this situation, whether we need to expand the > architecture. This part is 1) of Paul's email. And I agree that this > general considerations should be a separate draft. Although currently > ML-DSA and SLH-DSA are the only standardized signature algorithms, > there will be more algorithms being standardized in the future. We need > to have the consideration for the general mechanism now, rather than > designing one by one. > As a practical manner, I suggest adopting the current draft as is, and > then discussing (splitting) the general mechanism part later by > considering other possible PQC signature algorithms. I agree: adopt it as is, and fix it. I'm not quite convinced we can't do the general mechanism in this document, and then apply it to ML-DSA and SLH-DSA. I think that readers/reviewers would precer that. But, I don't feel strongly about this. -- Michael Richardson <mcr+i...@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide _______________________________________________ IPsec mailing list -- ipsec@ietf.org To unsubscribe send an email to ipsec-le...@ietf.org