Re: [IPsec] IPsec with QKD status

2014-11-13 Thread Yaron Sheffer
Hi Rod, Two quick comments: - I am fine with the Experimental/ISE route. - I support the SKEYSEED idea. It makes sense as a single point of integration into the protocol, so that if we ever specify a different way of generating key material, it would not need to be re-specified for QKD. Of c

[IPsec] IPsec with QKD status

2014-11-13 Thread Rodney Van Meter
ipsecme-ers, We have managed to catch a number of people in the halls to discuss our IPsec with QKD I-D. Haven't managed to catch Yaron yet. This mail is long. First, an admin summary of where we are, then a technical & writing action item list, and at the bottom a short FYI on the state of QKD

Re: [IPsec] IPsec with QKD

2014-11-12 Thread Paul_Koning
On Nov 12, 2014, at 3:01 PM, Tony Putman wrote: > ... > Perhaps this the key point: will the initiator ever be in a position > where it does not know that the responder will accept QKD? I would say yes. That would be a policy matter; it could be viewed as a downgrade, and if so you may want t

Re: [IPsec] IPsec with QKD

2014-11-12 Thread Tony Putman
Rod, I would class myself as an interested bystander, not one who would actually implement or use a QKD protocol, so I don't know whether this should be a work item or not. Certainly, some of the suggestions I'm making should not be adopted unless it *is* accepted as a work item. On 12/11/14 03:

Re: [IPsec] IPsec with QKD

2014-11-11 Thread Rodney Van Meter
Thanks Tony, good thoughts. Let me try to respond, though a couple of these are really Shota’s expertise, so if I misrepresent something hopefully he’ll correct me. (Man, it took me much of the afternoon to read through this, dig through a little code and some RFCs, and I still haven’t complet

Re: [IPsec] IPsec with QKD

2014-11-11 Thread Tony Putman
Rod, I read your draft with interest and have a number of comments and questions. I've not been around long enough to remember previous discussions on this (and couldn't find anything after a cursory search in archives), so please forgive me if I'm rehashing previous arguments. The QKD keys (an

Re: [IPsec] IPsec with QKD

2014-10-31 Thread Greg Troxel
writes: > I wonder if this should be worded more generically. This is really > about an external key agreement mechanism. QKD is one such mechanism, > but it isn’t clear to me that the machinery depends on this. > Suppose, for example, that you distributed copies of one-time pad > CDROMs to bo

Re: [IPsec] IPsec with QKD

2014-10-31 Thread Rodney Van Meter
On Oct 31, 2014, at 7:49 AM, Greg Troxel wrote: > > I implemented using QKD material for IPsec (in 2002, if I can remember > the years right), which included an interface between QKD processing and > racoon (on NetBSD) to include QKD bits in the Phase 2 hash. What's been > published on that ef

Re: [IPsec] IPsec with QKD

2014-10-29 Thread Rodney Van Meter
Actually, we had considered that; the same adjustments to IKE can be used for any out-of-band, asynchronous but ongoing supplier of key material, with OTP keys via courier being the obvious example. We decided when we started writing to focus on the QKD case, simply because we felt that the bro

Re: [IPsec] IPsec with QKD

2014-10-29 Thread Paul_Koning
I wonder if this should be worded more generically. This is really about an external key agreement mechanism. QKD is one such mechanism, but it isn’t clear to me that the machinery depends on this. Suppose, for example, that you distributed copies of one-time pad CDROMs to both locations, and

Re: [IPsec] IPsec with QKD

2014-10-27 Thread Rodney Van Meter
Yes, you’re correct, we should be more exact there. Shor’s algorithm solves both (if you believe in large-scale quantum computers). Classically, I haven’t studied the relationship in depth myself, but this bachelor’s thesis from Harvard seems to be a survey: http://modular.math.washington.edu/pr

Re: [IPsec] IPsec with QKD

2014-10-27 Thread Paul_Koning
A nit in section 5: "The security of Diffie-Hellman depends on the difficulty of the factoring problem”. More precisely, it depends on the difficulty of the modular discrete log problem, though it may be (I forgot if this is proven or a conjecture) that an efficient solution of that problem ca

Re: [IPsec] IPsec with QKD

2014-10-27 Thread Rodney Van Meter
On Oct 27, 2014, at 2:13 PM, Rodney Van Meter wrote: > > > Current status: > > * We have just uploaded an -01 of the I-D we wrote, incorporating feedback > from several people, including Sean Turner, Sheila Frankel and Alan Mink. > > http://datatracker.ietf.org/doc/draft-nagayama-ipsecme-i

[IPsec] IPsec with QKD

2014-10-27 Thread Rodney Van Meter
Those of you with long-ish memories will recall that about three years ago, Shota Nagayama and I wrote an I-D on the (relatively minor) modifications to IKEv2 necessary to use key material generated by quantum key distribution (QKD) devices. At the time, it generated a bit of controversy, both

[IPsec] IPsec with QKD

2009-11-07 Thread Rodney Van Meter
Shota Nagayama and I have been experimenting with using keys generated by quantum key distribution (QKD) devices to key IPsec tunnels. (The devices we used were borrowed from NEC, but we don't claim to represent them.) We have written an I-D on the protocol modifications necessary, and a