> -----Original Message-----
> From: IPsec [mailto:ipsec-boun...@ietf.org] On Behalf Of Valery Smyslov
> Sent: Thursday, August 20, 2015 3:24 AM
> To: Mike Borza; Michael Richardson; Dan Harkins
> Cc: IPsecME WG
> Subject: Re: [IPsec] PSK mode
> 
> Hi,
> 
> IKEv2 has symmetrick PSK authentication method. However, it is different
> from IKEv1.
> The difference is that in IKEv1 the session keys computation involves both
> preshared key and DH shared secret
> 
> SKEYID = prf(pre-shared-key, Ni_b | Nr_b) SKEYID_d = prf(SKEYID, g^xy |
> CKY-I | CKY-R | 0) SKEYID_a = prf(SKEYID, SKEYID_d | g^xy | CKY-I | CKY-R |
> 1) SKEYID_e = prf(SKEYID, SKEYID_a | g^xy | CKY-I | CKY-R | 2)
> 
> while in IKEv2 it involves only DH shared secret, so preshared key is used for
> authentication only and is not used for session keys calculations
> 
> SKEYSEED = prf(Ni | Nr, g^ir)
> {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr} = prf+ (SKEYSEED, Ni |
> Nr | SPIi | SPIr)
> 
> This change was intentional, it was made by Hugo Krawczyk during work on
> IKEv2 due to complaints from the community that if IKEv1 PSK auth mode
> was used in IKEv2 then it would be impossible for responder to select proper
> preshared secret based on initiator's identity (like in IKEv1 Main Mode). As
> far as I remember, when making this change Hugo mentioned, that it would
> weaken security of the protocol.
> 
> Does NSA mean this difference when claiming that IKEv1 PSK mode is the
> only QC-safe protocol?

I believe so.

> Should we add similar mode to IKEv2?

I believe that there is an easier alternative; the problem is that IKEv2 is 
relying on the security of the (EC)DH exchange, and that is breakable with a 
Quantum Computer.  A cleaner approach would be to replace the DH exchange with 
something that does the same functionality, but in a Quantum Resistant manner.  
NTRU (using an ephemeral key) can do precisely this (and performs quickly 
enough, and with small enough KE payloads not to cause fragmentation); we could 
negotiate NTRU as "yet another 'DH group'".  That way, we don't need to have 
this as a separate option to be negotiated. 

> 
> Regards,
> Valery Smyslov.
> 
> 
> 
> > They don't mention IKEv2.  I don't know IKEv2 well enough to know
> > whether there are any symmetric PSK authentication schemes, but if not,
> perhaps there should be.
> > The point they're making is that the ECC-based authentication methods
> > become insecure when quantum computers of sufficient power become
> > available, and in light of recent progress in the field the indications are 
> > that
> they will become available in a reasonably short timeframe.
> > (And they should know that timeframe better than just about anybody
> > else.) I view this as an indication that they believe there may be
> > viable QCs of that capability in the five to ten years timeframe.
> >
> > Mike
> >
> > -----Original Message-----
> > From: IPsec [mailto:ipsec-boun...@ietf.org] On Behalf Of Michael
> > Richardson
> > Sent: Wednesday, August 19, 2015 13:17
> > To: Dan Harkins <dhark...@lounge.org>
> > Cc: IPsecME WG <ipsec@ietf.org>
> > Subject: Re: [IPsec] PSK mode
> >
> >
> > Dan Harkins <dhark...@lounge.org> wrote:
> >    > https://www.nsa.gov/ia/programs/suiteb_cryptography/index.shtml
> >
> >    > "CSfC deployments involving an IKE/IPsec layer may use RFC
> >    > 2409-conformant implementations of the IKE standard (IKEv1)
> >    > together with large, high-entropy, pre-shared keys and the
> >    > AES-256 encryption algorithm.  RFC 2409 is the only version
> >    > of the IKE standard that leverages symmetric pre-shared keys
> >    > in a manner that may achieve quantum resistant confidentiality."
> >
> > So, all of IKEv2 is out, according to them?
> > Or they just didn't consider it yet?
> >
> > --
> > Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software
> Works
> > -= IPv6 IoT consulting =-
> >
> >
> >
> > _______________________________________________
> > IPsec mailing list
> > IPsec@ietf.org
> > https://www.ietf.org/mailman/listinfo/ipsec
> 
> _______________________________________________
> IPsec mailing list
> IPsec@ietf.org
> https://www.ietf.org/mailman/listinfo/ipsec

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to